CURL-CVE-2017-8817

Source
https://curl.se/docs/CVE-2017-8817.html
Import Source
https://curl.se/docs/CURL-CVE-2017-8817.json
JSON Data
https://api.osv.dev/v1/vulns/CURL-CVE-2017-8817
Aliases
Published
2017-11-29T08:00:00Z
Modified
2024-07-02T09:22:24Z
Summary
FTP wildcard out of bounds read
Details

libcurl contains a read out of bounds flaw in the FTP wildcard function.

libcurl's FTP wildcard matching feature, which is enabled with the CURLOPT_WILDCARDMATCH option can use a built-in wildcard function or a user provided one. The built-in wildcard function has a flaw that makes it not detect the end of the pattern string if it ends with an open bracket ([) but instead it continues reading the heap beyond the end of the URL buffer that holds the wildcard.

For applications that use HTTP(S) URLs, allow libcurl to handle redirects and have FTP wildcards enabled, this flaw can be triggered by malicious servers that can redirect clients to a URL using such a wildcard pattern.

References
Credits
    • OSS-Fuzz - FINDER
    • Daniel Stenberg - REMEDIATION_DEVELOPER
    • Max Dymond - OTHER

Affected packages

Git / github.com/curl/curl.git

Affected ranges

Type
SEMVER
Events
Introduced
7.21.0
Fixed
7.57.0
Type
GIT
Repo
https://github.com/curl/curl.git
Events

Affected versions

7.*

7.21.0
7.21.1
7.21.2
7.21.3
7.21.4
7.21.5
7.21.6
7.21.7
7.22.0
7.23.0
7.23.1
7.24.0
7.25.0
7.26.0
7.27.0
7.28.0
7.28.1
7.29.0
7.30.0
7.31.0
7.32.0
7.33.0
7.34.0
7.35.0
7.36.0
7.37.0
7.37.1
7.38.0
7.39.0
7.40.0
7.41.0
7.42.0
7.42.1
7.43.0
7.44.0
7.45.0
7.46.0
7.47.0
7.47.1
7.48.0
7.49.0
7.49.1
7.50.0
7.50.1
7.50.2
7.50.3
7.51.0
7.52.0
7.52.1
7.53.0
7.53.1
7.54.0
7.54.1
7.55.0
7.55.1
7.56.0
7.56.1