Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9586

Опубликовано: 23 апр. 2018
Источник: debian
EPSS Низкий

Описание

curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
curlfixed7.52.1-1package

Примечания

  • https://curl.haxx.se/docs/adv_20161221A.html

  • Fixed by: https://github.com/curl/curl/commit/3ab3c16db6a5674f53cf23d56512a405fde0b2c9

  • There are no known vulnerable applications but as this is a

  • library it should be fixed as we do not know the full impact.

EPSS

Процентиль: 69%
0.00609
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 8 лет назад

curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.

CVSS3: 5.9
redhat
около 9 лет назад

curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.

CVSS3: 5.9
nvd
почти 8 лет назад

curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.

CVSS3: 8.1
github
больше 3 лет назад

curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.

suse-cvrf
почти 9 лет назад

Security update for curl

EPSS

Процентиль: 69%
0.00609
Низкий