The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
[
{
"signature_type": "Line",
"deprecated": false,
"target": {
"file": "src/tool_writeout.c"
},
"digest": {
"line_hashes": [
"119066316151948807005295019564101395011",
"137737830742583149452429535963228918912",
"51529351887636434842909831520961132979",
"180982491866925066316252044149786616047"
],
"threshold": 0.9
},
"source": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13",
"signature_version": "v1",
"id": "CVE-2017-7407-503b5770"
},
{
"signature_type": "Function",
"deprecated": false,
"target": {
"file": "src/tool_writeout.c",
"function": "ourWriteOut"
},
"digest": {
"length": 5508.0,
"function_hash": "122384078902818575986643295615648528317"
},
"source": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13",
"signature_version": "v1",
"id": "CVE-2017-7407-defd70e3"
}
]