CVE-2016-7167

Priority
Low
Description
Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape,
(3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before
7.50.3 allow attackers to have unspecified impact via a string of length
0xffffffff, which triggers a heap-based buffer overflow.
References
Bugs
Assigned-to
mdeslaur
Package
Source: curl (LP Ubuntu Debian)
Upstream:released (7.50.3)
Ubuntu 17.10 (Artful Aardvark):released (7.50.1-1ubuntu2)
Ubuntu 12.04 ESM (Precise Pangolin):released (7.22.0-3ubuntu4.17)
Ubuntu 14.04 LTS (Trusty Tahr):released (7.35.0-1ubuntu2.10)
Ubuntu Core 15.04:released (7.38.0-3ubuntu2.4)
Ubuntu 16.04 LTS (Xenial Xerus):released (7.47.0-1ubuntu2.2)
Ubuntu 17.04 (Zesty Zapus):released (7.50.1-1ubuntu2)
Patches:
Patch:https://curl.haxx.se/CVE-2016-7167.patch
More Information

Updated: 2017-09-28 22:14:39 UTC (commit 13419)