First published: Wed Dec 21 2016(Updated: )
curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.52.0 | 7.52.0 |
Curl | <7.52.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9586 is considered a medium-severity vulnerability due to the potential for buffer overflow exploitation.
To fix CVE-2016-9586, upgrade to curl version 7.52.0 or later.
The main risk of CVE-2016-9586 is that it allows remote attackers to execute arbitrary code via crafted floating point inputs.
CVE-2016-9586 affects versions of curl before 7.52.0.
Applications that accept unvalidated format strings from user input while using libcurl are vulnerable to CVE-2016-9586.