Integer Overflow or Wraparound Affecting libcurl package, versions *


0.0
low

Snyk CVSS

    Attack Complexity High

    Threat Intelligence

    EPSS 1.27% (86th percentile)
Expand this section
NVD
9.8 critical
Expand this section
Red Hat
3.7 low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-CENTOS7-LIBCURL-1968088
  • published 26 Jul 2021
  • disclosed 2 Nov 2016

How to fix?

There is no fixed version for Centos:7 libcurl.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libcurl package and not the libcurl package as distributed by Centos. See How to fix? for Centos:7 relevant fixed versions and status.

The URL percent-encoding decode function in libcurl before 7.51.0 is called curl_easy_unescape. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.