First published: Mon Apr 03 2017(Updated: )
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
redhat/curl | <7.54.0 | 7.54.0 |
Curl | =7.53.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7407 has been classified to allow sensitive information disclosure under specific circumstances.
To mitigate CVE-2017-7407, upgrade curl to version 7.61.1 or later on affected systems.
CVE-2017-7407 affects curl version 7.53.1 specifically, as well as earlier versions.
CVE-2017-7407 requires physical proximity to the affected system for exploitation.
CVE-2017-7407 can lead to exposure of sensitive information displayed on the screen while using specific commands.