First published: Tue Oct 25 2016(Updated: )
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.51.0 | 7.51.0 |
libcurl | <7.51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8622 is considered a medium-severity vulnerability as it can lead to a buffer overflow in libcurl.
To fix CVE-2016-8622, upgrade libcurl to version 7.51.0 or later.
CVE-2016-8622 affects versions of libcurl prior to 7.51.0.
CVE-2016-8622 could allow an attacker to exploit a buffer overflow, potentially leading to arbitrary code execution.
CVE-2016-8622 is not limited to a specific operating system but affects libcurl across multiple platforms.