Oval Definition:oval:com.ubuntu.xenial:def:201795020000000
Revision Date:2017-06-14Version:1
Title:CVE-2017-9502 on Ubuntu 16.04 LTS (xenial) - medium.
Description:In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-9502
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • NOT curl package in xenial, while related to the CVE in some way, is not affected (note: 'Windows/Dos only').
  • OR NOT libcurl3 package in xenial, while related to the CVE in some way, is not affected (note: 'Windows/Dos only').
  • OR NOT libcurl3-gnutls package in xenial, while related to the CVE in some way, is not affected (note: 'Windows/Dos only').
  • OR NOT libcurl3-nss package in xenial, while related to the CVE in some way, is not affected (note: 'Windows/Dos only').
  • BACK