// For flags

CVE-2005-4077

 

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-12-08 CVE Reserved
  • 2005-12-08 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (38)
URL Date SRC
URL Date SRC
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt 2018-10-19
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html 2018-10-19
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html 2018-10-19
http://secunia.com/advisories/17960 2018-10-19
http://secunia.com/advisories/17961 2018-10-19
http://secunia.com/advisories/17965 2018-10-19
http://secunia.com/advisories/17977 2018-10-19
http://secunia.com/advisories/18105 2018-10-19
http://secunia.com/advisories/18188 2018-10-19
http://secunia.com/advisories/18336 2018-10-19
http://secunia.com/advisories/19261 2018-10-19
http://secunia.com/advisories/19433 2018-10-19
http://secunia.com/advisories/19457 2018-10-19
http://secunia.com/advisories/20077 2018-10-19
http://www.debian.org/security/2005/dsa-919 2018-10-19
http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml 2018-10-19
http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2005:224 2018-10-19
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-875.html 2018-10-19
http://www.trustix.org/errata/2005/0072 2018-10-19
http://www.vupen.com/english/advisories/2005/2791 2018-10-19
http://www.vupen.com/english/advisories/2006/0960 2018-10-19
http://www.vupen.com/english/advisories/2006/1779 2018-10-19
http://www.vupen.com/english/advisories/2008/0924/references 2018-10-19
https://usn.ubuntu.com/228-1 2018-10-19
https://access.redhat.com/security/cve/CVE-2005-4077 2005-12-20
https://bugzilla.redhat.com/show_bug.cgi?id=1617850 2005-12-20
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.11.2
Search vendor "Daniel Stenberg" for product "Curl" and version "7.11.2"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.12
Search vendor "Daniel Stenberg" for product "Curl" and version "7.12"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.12.1
Search vendor "Daniel Stenberg" for product "Curl" and version "7.12.1"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.12.2
Search vendor "Daniel Stenberg" for product "Curl" and version "7.12.2"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.12.3
Search vendor "Daniel Stenberg" for product "Curl" and version "7.12.3"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.13
Search vendor "Daniel Stenberg" for product "Curl" and version "7.13"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.13.1
Search vendor "Daniel Stenberg" for product "Curl" and version "7.13.1"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.13.2
Search vendor "Daniel Stenberg" for product "Curl" and version "7.13.2"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.14
Search vendor "Daniel Stenberg" for product "Curl" and version "7.14"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.14.1
Search vendor "Daniel Stenberg" for product "Curl" and version "7.14.1"
-
Affected
Daniel Stenberg
Search vendor "Daniel Stenberg"
Curl
Search vendor "Daniel Stenberg" for product "Curl"
7.15
Search vendor "Daniel Stenberg" for product "Curl" and version "7.15"
-
Affected