Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

cURL/libcurl 7.x < 7.50.3 RCE

High

Synopsis

The host is running a version of cURL/libcurl that is vulnerable to a remote code execution (RCE) attack vector.

Description

Versions of cURL and libcurl prior to 7.50.3 are affected by an integer overflow condition in the 'curl_escape()', 'curl_easy_escape()', 'curl_unescape()', and 'curl_easy_unescape()' functions in 'lib/escape.c' that is triggered when handling overly long string lengths. This may allow a context-dependent attacker to cause a heap-based buffer overflow, crashing a process linked against the library or potentially allowing the execution of arbitrary code.

Solution

Upgrade to cURL/libcurl 7.50.3 or later.