Vulnerability Details : CVE-2017-7407
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2017-7407
Probability of exploitation activity in the next 30 days: 0.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 42 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-7407
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
2.4
|
LOW | CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
0.9
|
1.4
|
NIST |
CWE ids for CVE-2017-7407
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7407
-
https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
tool_writeout: fixed a buffer read overrun on --write-out · curl/curl@1890d59 · GitHubPatch;Vendor Advisory
-
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
CPU Oct 2018
-
https://security.gentoo.org/glsa/201709-14
cURL: Multiple vulnerabilities (GLSA 201709-14) — Gentoo security
-
https://access.redhat.com/errata/RHSA-2018:3558
RHSA-2018:3558 - Security Advisory - Red Hat Customer Portal
Products affected by CVE-2017-7407
- cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*