Out-of-bounds Read Affecting libcurl-devel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL6-LIBCURLDEVEL-1373804
- published 26 Jul 2021
- disclosed 4 Apr 2017
Introduced: 4 Apr 2017
CVE-2017-7407 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:6 libcurl-devel.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libcurl-devel package and not the libcurl-devel package as distributed by RHEL.
See How to fix? for RHEL:6 relevant fixed versions and status.
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.