CVE-2017-8817

Published: Nov 29, 2017 Last Modified: Apr 20, 2025 EU-VD ID: EUVD-2017-17760 Aliases: GSD-2017-8817
ExploitDB:
Other exploit source:
Google Dorks:
CRITICAL 9,8
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 7,5
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0061
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

125

Out-of-bounds Read

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Availability Other
Potential Impacts:
Read Memory Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Varies By Context
Applicable Platforms
Languages: C, C++, Memory-Unsafe
Technologies: ICS/OT
View CWE Details
Application

Curl by Haxx

Version Range Affected
From 7.21.0 (inclusive)
To 7.56.1 (inclusive)
cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Libcurl by Haxx

Version Range Affected
From 7.21.0 (exclusive)
To 7.56.1 (inclusive)
cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://access.redhat.com/errata/RHSA-2018:3558
https://curl.haxx.se/docs/adv_2017-ae72.html
http://security.cucumberlinux.com/security/details.php?id=162
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://www.debian.org/security/2017/dsa-4051
http://www.securityfocus.com/bid/102057
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039897
https://access.redhat.com/errata/RHSA-2018:3558
https://curl.haxx.se/docs/adv_2017-ae72.html
http://security.cucumberlinux.com/security/details.php?id=162
https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
https://security.gentoo.org/glsa/201712-04
https://www.debian.org/security/2017/dsa-4051
http://www.securityfocus.com/bid/102057
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/102057
http://www.securitytracker.com/id/1039897
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039897