First published: Tue Nov 21 2017(Updated: )
libcurl contains a read out of bounds flaw in the FTP wildcard function. libcurl's FTP wildcard matching feature, which is enabled with the `CURLOPT_WILDCARDMATCH` option can use a built-in wildcard function or a user provided one. The built-in wildcard function has a flaw that makes it not detect the end of the pattern string if it ends with an open bracket (`[`) but instead it will continue reading the heap beyond the end of the URL buffer that holds the wildcard. For applications that use HTTP(S) URLs, allow libcurl to handle redirects and have FTP wildcards enabled, this flaw can be triggered by malicious servers that can redirect clients to a URL using such a wildcard pattern. - Affected versions: libcurl 7.21.0 to and including 7.56.1 - Not affected versions: libcurl < 7.21.0 and >= 7.57.0
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <7.57.0 | 7.57.0 |
Haxx Curl | >=7.21.0<=7.56.1 | |
Haxx Libcurl | >7.21.0<=7.56.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/curl | 7.64.0-4+deb10u2 7.64.0-4+deb10u7 7.74.0-1.3+deb11u9 7.74.0-1.3+deb11u10 7.88.1-10+deb12u3 7.88.1-10+deb12u4 8.4.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8817 is a vulnerability in curl and libcurl before version 7.57.0 that allows remote attackers to cause a denial of service or possibly have unspecified other impact via a string ending with an '[' character.
CVE-2017-8817 has a severity rating of 9.8 (Critical).
The software affected by CVE-2017-8817 includes curl and libcurl versions prior to 7.57.0.
To fix CVE-2017-8817, update curl and libcurl to version 7.57.0 or later.
You can find more information about CVE-2017-8817 in the following references: [bugzilla.redhat.com](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1356600&action=diff), [bugzilla.redhat.com](https://bugzilla.redhat.com/show_bug.cgi/attachment.cgi?id=1356600&action=edit), [github.com](https://github.com/curl/curl/commit/0825cd80a62c).