First published: Tue Oct 25 2016(Updated: )
The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.51.0 | 7.51.0 |
Curl | <7.51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8617 is considered a high severity vulnerability due to the potential for buffer overflow attacks on 32bit systems.
To fix CVE-2016-8617, upgrade curl to version 7.51.0 or later.
CVE-2016-8617 affects curl versions prior to 7.51.0 running on 32bit systems.
The vulnerability in CVE-2016-8617 is caused by insufficient allocation checks in the base64 encode function when processing large inputs.
Yes, CVE-2016-8617 can potentially be exploited remotely if the vulnerable curl version is used in an environment that accepts user-provided input.