- Description
- Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.
- Source
- secalert@redhat.com
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
- Comment
- -
- Impact
- -
- Solution
- -
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:daniel_stenberg:curl:7.15.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2AC07A04-1E66-4054-ACB1-667D1D7A914C"
},
{
"criteria": "cpe:2.3:a:daniel_stenberg:curl:7.15.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E09A7C68-B570-4495-896C-2B5ABA191CC5"
},
{
"criteria": "cpe:2.3:a:daniel_stenberg:curl:7.15.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0E40A18E-3B2A-48C2-B253-A4AC53D60C79"
}
],
"operator": "OR"
}
]
}
]