Curl < 7.15.3 TFTP URL Parsing Overflow

High Nessus Network Monitor Plugin ID 3481


The remote host is vulnerable to a buffer overflow.


The remote host is using a version of curl (or libcurl) that is vulnerable to a remote buffer overflows. An attacker would have to set up a rogue web server and entice a curl user to browse to the malicious server to exploit this vulnerability. Upon successful exploitation, the attacker would be able to execute arbitrary commands with the rights of the web server. The specific flaw occurs when processing long 'tftp://' URIs. E.g., t[512 bytes]


Upgrade to version 7.15.3 or higher.

See Also

Plugin Details

Severity: High

ID: 3481

File Name: 3481.prm

Family: Web Clients

Published: 2006/03/20

Modified: 2016/12/06

Dependencies: 1735, 8314

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 7.3

Temporal Score: 6.4


Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:haxx:curl

Reference Information

CVE: CVE-2006-1061

BID: 17154

OSVDB: 23982