CVE-2017-1000101

EUVD-2017-1405
curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 69%
Affected Products (NVD)
VendorProductVersion
haxxcurl
7.4.1
haxxcurl
7.35.0
haxxcurl
7.36.0
haxxcurl
7.37.0
haxxcurl
7.37.1
haxxcurl
7.38.0
haxxcurl
7.39.0
haxxcurl
7.40.0
haxxcurl
7.41.0
haxxcurl
7.42.0
haxxcurl
7.42.1
haxxcurl
7.43.0
haxxcurl
7.44.0
haxxcurl
7.45.0
haxxcurl
7.46.0
haxxcurl
7.47.0
haxxcurl
7.47.1
haxxcurl
7.48.0
haxxcurl
7.49.0
haxxcurl
7.49.1
haxxcurl
7.50.0
haxxcurl
7.50.1
haxxcurl
7.50.2
haxxcurl
7.50.3
haxxcurl
7.51.0
haxxcurl
7.52.0
haxxcurl
7.52.1
haxxcurl
7.53.0
haxxcurl
7.53.1
haxxcurl
7.54.0
haxxcurl
7.54.1
haxxcurl
7.55.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
trusty
Fixed 7.35.0-1ubuntu2.11
released
xenial
Fixed 7.47.0-1ubuntu2.3
released
zesty
Fixed 7.52.1-4ubuntu1.2
released