First published: Wed Jun 14 2017(Updated: )
In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Curl | <=7.54.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9502 has been assigned a medium severity rating due to the potential for memory corruption leading to application crashes or arbitrary code execution.
To fix CVE-2017-9502, upgrade to curl version 7.54.1 or later, which includes a patch for the vulnerability.
CVE-2017-9502 affects curl versions prior to 7.54.1 specifically on Windows and DOS platforms.
Yes, CVE-2017-9502 can potentially be exploited remotely if an attacker crafts a URL that triggers the vulnerability.
The impact of CVE-2017-9502 includes possible memory corruption which could lead to crashes or execution of malicious code in affected applications.