First published: Thu Dec 08 2005(Updated: )
Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
curl | =7.11.2 | |
curl | =7.12 | |
curl | =7.12.1 | |
curl | =7.12.2 | |
curl | =7.12.3 | |
curl | =7.13 | |
curl | =7.13.1 | |
curl | =7.13.2 | |
curl | =7.14 | |
curl | =7.14.1 | |
curl | =7.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4077 is considered a high severity vulnerability due to its potential to trigger a buffer overflow and cause denial of service.
To fix CVE-2005-4077, it is recommended to upgrade the cURL library to a version later than 7.15.0 where the vulnerability is patched.
The affected versions of cURL for CVE-2005-4077 range from 7.11.2 to 7.15.0.
CVE-2005-4077 typically requires local access to exploit due to the nature of the buffer overflow vulnerabilities.
Exploiting CVE-2005-4077 can lead to denial of service or the ability to bypass security restrictions in PHP applications.