FreeBSD : cURL -- potential memory disclosure (04f29189-1a05-11e7-bc6e-b499baebfeaf)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The cURL project reports :

There were two bugs in curl's parser for the command line option
--write-out (or -w for short) that would skip the end of string zero
byte if the string ended in a % (percent) or \ (backslash), and it
would read beyond that buffer in the heap memory and it could then
potentially output pieces of that memory to the terminal or the target
file etc..

This flaw only exists in the command line tool.

We are not aware of any exploit of this flaw.

See also :

https://curl.haxx.se/docs/adv_20170403.html
http://www.nessus.org/u?20c0c72c

Solution :

Update the affected package.

Risk factor :

Low / CVSS Base Score : 2.1
(CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 99206 ()

Bugtraq ID:

CVE ID: CVE-2017-7407

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now