CVE-2016-8622
curl: URL unescape heap overflow via integer truncation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.
La función URL percent-encoding en libcurl en versiones anteriores a la 7.51.0 se denomina "curl_easy_unescape". Internamente, aunque esta función se haya hecho para asignar un búfer de destino no escapado más grande de 2GB, devuelve esa nueva longitud en una variable de enteros de 32 bits. Por lo tanto, la longitud se truncaría o se truncaría y, además, se volvería negativa. Esto podría conducir a que libcurl escriba fuera de su búfer basado en memoria dinámica (heap).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-10-12 CVE Reserved
- 2016-11-04 CVE Published
- 2024-08-06 CVE Updated
- 2024-11-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-122: Heap-based Buffer Overflow
- CWE-190: Integer Overflow or Wraparound
- CWE-787: Out-of-bounds Write
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/94105 | Third Party Advisory | |
http://www.securitytracker.com/id/1037192 | Third Party Advisory | |
https://www.tenable.com/security/tns-2016-21 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 | 2023-11-07 | |
https://curl.haxx.se/docs/adv_20161102H.html | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:2486 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2018:3558 | 2023-11-07 | |
https://security.gentoo.org/glsa/201701-47 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2016-8622 | 2018-11-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1388386 | 2018-11-13 |