Do your applications use this vulnerable package?
Test your applications
Overview
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
References
CVSS Score
8.1
high severity
-
Attack VectorNetwork
-
Attack ComplexityHigh
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityHigh
-
IntegrityHigh
-
AvailabilityHigh
- CVE
- CVE-2016-9586
- CWE
- CWE-119 CWE-122
- Snyk ID
- SNYK-DEBIAN8-CURL-358896
- Disclosed
- 23 Apr, 2018
- Published
- 23 Apr, 2018