Vulnerability Details : CVE-2017-9502
In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").
Vulnerability category: OverflowDenial of service
Products affected by CVE-2017-9502
- cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-9502
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 59 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-9502
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2017-9502
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-9502
-
http://www.securitytracker.com/id/1038697
libcurl 'file' Protocol Buffer Overflow Lets Local Users Execute Arbitrary Code - SecurityTracker
-
http://openwall.com/lists/oss-security/2017/06/14/1
oss-security - [SECURITY ADVISORY] curl: URL file scheme drive letter buffer overflowMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/99120
cURL/libcURL 'b/lib/url.c' Heap Based Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
https://curl.haxx.se/docs/adv_20170614.html
curl - URL file scheme drive letter buffer overflow - CVE-2017-9502Vendor Advisory
Jump to