First published: Tue Oct 25 2016(Updated: )
The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.51.0 | 7.51.0 |
Curl | <7.51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8620 has been assigned a moderate severity level due to the potential for integer overflow and out-of-bounds reads.
To fix CVE-2016-8620, upgrade curl to version 7.51.0 or later.
CVE-2016-8620 affects curl versions prior to 7.51.0.
The 'globbing' feature in curl is linked to CVE-2016-8620.
Yes, user-controlled input can exploit CVE-2016-8620, leading to potential security issues.