First published: Tue Dec 19 2000(Updated: )
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =6.0 | |
curl | =6.1 | |
curl | =6.1beta | |
curl | =6.3 | |
curl | =6.4 | |
curl | =6.5 | |
curl | =6.5.1 | |
curl | =6.5.2 | |
curl | =7.1 | |
curl | =7.1.1 | |
curl | =7.2 | |
curl | =7.2.1 | |
curl | =7.3 | |
curl | =7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0973 has a critical severity due to its potential for remote command execution.
To fix CVE-2000-0973, upgrade to curl version 6.0 or higher.
CVE-2000-0973 affects curl versions prior to 6.0, including 6.1, 6.1beta, and up to 7.4.
Yes, CVE-2000-0973 can be exploited remotely by crafting a long error message.
CVE-2000-0973 is a buffer overflow vulnerability.