製品・ソフトウェアに関する情報
Windows および DOS 上の curl におけるバッファエラーの脆弱性
Title Windows および DOS 上の curl におけるバッファエラーの脆弱性
Summary

Windows および DOS 上の curl には、バッファエラーの脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date June 14, 2017, midnight
Registration Date July 21, 2017, 5:03 p.m.
Last Update July 21, 2017, 5:03 p.m.
CVSS3.0 : 警告
Score 5.3
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Affected System
Haxx
cURL 7.54.1 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2017年07月21日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2017-9502
Summary

In curl before 7.54.1 on Windows and DOS, libcurl's default protocol function, which is the logic that allows an application to set which protocol libcurl should attempt to use when given a URL without a scheme part, had a flaw that could lead to it overwriting a heap based memory buffer with seven bytes. If the default protocol is specified to be FILE or a file: URL lacks two slashes, the given "URL" starts with a drive letter, and libcurl is built for Windows or DOS, then libcurl would copy the path 7 bytes off, so that the end of the given path would write beyond the malloc buffer (7 bytes being the length in bytes of the ascii string "file://").

Publication Date June 14, 2017, 10:29 p.m.
Registration Date Jan. 26, 2021, 1:31 p.m.
Last Update Nov. 21, 2024, 12:36 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:* 7.54.0
Related information, measures and tools
Common Vulnerabilities List