Integer Overflow or Wraparound

Affecting curl package, versions <7.38.0-4+deb8u13

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.

References

CVSS Score

9.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2016-7167
CWE
CWE-190
Snyk ID
SNYK-DEBIAN8-CURL-358408
Disclosed
07 Oct, 2016
Published
07 Oct, 2016