First published: Tue Nov 21 2017(Updated: )
curl. An integer overflow existed in curl. This issue was addressed with improved bounds checking.
Credit: Alex Nichols security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
Haxx Curl | >7.36.0<=7.56.1 | |
Haxx Libcurl | >=7.36.0<=7.56.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Apple macOS High Sierra | <10.13.4 | 10.13.4 |
Apple Sierra | ||
Apple El Capitan | ||
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-8816 is a vulnerability in curl that allows attackers to cause a denial of service or have unspecified impact by exploiting an integer overflow and resultant buffer overflow.
CVE-2017-8816 is considered critical with a severity rating of 9.8.
curl and libcurl versions before 7.57.0 on 32-bit platforms are affected by CVE-2017-8816.
To fix CVE-2017-8816, update curl and libcurl to version 7.57.0 or later.
More information about CVE-2017-8816 can be found in the references: [link 1](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1356597&action=diff), [link 2](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1356597&action=edit), [link 3](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1356599&action=diff).