#VU66916 Heap-based buffer overflow in libcurl - CVE-2013-2174
Published: September 1, 2022
libcurl
curl.haxx.se
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in the "curl_easy_unescape" function. A remote attacker can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://curl.haxx.se/docs/adv_20130622.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2013-0983.html
- http://www.debian.org/security/2013/dsa-2713
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.securityfocus.com/bid/60737
- http://www.ubuntu.com/usn/USN-1894-1
- https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737