Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7407

Опубликовано: 03 апр. 2017
Источник: ubuntu
Приоритет: negligible
CVSS2: 2.1
CVSS3: 2.4

Описание

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

РелизСтатусПримечание
artful

not-affected

7.55.1-1ubuntu1
devel

not-affected

7.55.1-1ubuntu1
esm-infra-legacy/trusty

released

7.35.0-1ubuntu2.11
esm-infra/xenial

released

7.47.0-1ubuntu2.3
precise

ignored

end of life
precise/esm

not-affected

7.22.0-3ubuntu4.18
trusty

released

7.35.0-1ubuntu2.11
trusty/esm

released

7.35.0-1ubuntu2.11
upstream

released

7.54.0,7.52.1-4
vivid/stable-phone-overlay

ignored

end of life

Показывать по

2.1 Low

CVSS2

2.4 Low

CVSS3

Связанные уязвимости

CVSS3: 2.4
redhat
почти 9 лет назад

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

CVSS3: 2.4
nvd
почти 9 лет назад

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

CVSS3: 2.4
debian
почти 9 лет назад

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow ...

CVSS3: 2.4
github
больше 3 лет назад

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

suse-cvrf
почти 9 лет назад

Security update for curl

2.1 Low

CVSS2

2.4 Low

CVSS3