SB2017061605 - Arbitrary code execution in libcurl



SB2017061605 - Arbitrary code execution in libcurl

Published: June 16, 2017

Security Bulletin ID SB2017061605
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Buffer overflow (CVE-ID: CVE-2017-9502)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists on Windows-based and DOS-based systems due to buffer overflow when handling malicious input. A local attacker can supply a specially crafted 'file:' URL without the '//' following the colon character, trigger memory corruption and execute arbitrary code on the target system with the privileges of the application using libcurl.

Successful exploitation of the vulnerability may result in full system compromise.

Remediation

Install update from vendor's website.