{"id":"USN-3441-1","summary":"curl vulnerabilities","details":"Daniel Stenberg discovered that curl incorrectly handled large floating\npoint output. A remote attacker could use this issue to cause curl to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.\n(CVE-2016-9586)\n\nEven Rouault discovered that curl incorrectly handled large file names when\ndoing TFTP transfers. A remote attacker could use this issue to cause curl\nto crash, resulting in a denial of service, or possibly obtain sensitive\nmemory contents. (CVE-2017-1000100)\n\nBrian Carpenter and Yongji Ouyang discovered that curl incorrectly handled\nnumerical range globbing. A remote attacker could use this issue to cause\ncurl to crash, resulting in a denial of service, or possibly obtain\nsensitive memory contents. (CVE-2017-1000101)\n\nMax Dymond discovered that curl incorrectly handled FTP PWD responses. A\nremote attacker could use this issue to cause curl to crash, resulting in a\ndenial of service. (CVE-2017-1000254)\n\nBrian Carpenter discovered that curl incorrectly handled the --write-out\ncommand line option. A local attacker could possibly use this issue to\nobtain sensitive memory contents. (CVE-2017-7407)\n","modified":"2026-04-27T09:13:44.017534Z","published":"2017-10-10T12:54:33Z","related":["UBUNTU-CVE-2016-9586","UBUNTU-CVE-2017-1000100","UBUNTU-CVE-2017-1000101","UBUNTU-CVE-2017-1000254","UBUNTU-CVE-2017-7407"],"upstream":["CVE-2016-9586","CVE-2017-1000100","CVE-2017-1000101","CVE-2017-1000254","CVE-2017-7407","UBUNTU-CVE-2016-9586","UBUNTU-CVE-2017-1000100","UBUNTU-CVE-2017-1000101","UBUNTU-CVE-2017-1000254","UBUNTU-CVE-2017-7407"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3441-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-9586"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000100"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000101"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000254"}],"affected":[{"package":{"name":"curl","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/curl@7.35.0-1ubuntu2.11?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.35.0-1ubuntu2.11"}]}],"versions":["7.32.0-1ubuntu1","7.33.0-1ubuntu1","7.34.0-1ubuntu1","7.35.0-1ubuntu1","7.35.0-1ubuntu2","7.35.0-1ubuntu2.1","7.35.0-1ubuntu2.2","7.35.0-1ubuntu2.3","7.35.0-1ubuntu2.5","7.35.0-1ubuntu2.6","7.35.0-1ubuntu2.7","7.35.0-1ubuntu2.8","7.35.0-1ubuntu2.9","7.35.0-1ubuntu2.10"],"ecosystem_specific":{"binaries":[{"binary_version":"7.35.0-1ubuntu2.11","binary_name":"curl"},{"binary_version":"7.35.0-1ubuntu2.11","binary_name":"libcurl3"},{"binary_version":"7.35.0-1ubuntu2.11","binary_name":"libcurl3-gnutls"},{"binary_version":"7.35.0-1ubuntu2.11","binary_name":"libcurl3-nss"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-9586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2017-7407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-1000100"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-1000101"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000254"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3441-1.json"}},{"package":{"name":"curl","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/curl@7.47.0-1ubuntu2.3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.47.0-1ubuntu2.3"}]}],"versions":["7.43.0-1ubuntu2","7.45.0-1ubuntu1","7.46.0-1ubuntu1","7.47.0-1ubuntu1","7.47.0-1ubuntu2","7.47.0-1ubuntu2.1","7.47.0-1ubuntu2.2"],"ecosystem_specific":{"binaries":[{"binary_version":"7.47.0-1ubuntu2.3","binary_name":"curl"},{"binary_version":"7.47.0-1ubuntu2.3","binary_name":"libcurl3"},{"binary_version":"7.47.0-1ubuntu2.3","binary_name":"libcurl3-gnutls"},{"binary_version":"7.47.0-1ubuntu2.3","binary_name":"libcurl3-nss"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2016-9586"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2017-7407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-1000100"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-1000101"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000254"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3441-1.json"}}],"schema_version":"1.7.5"}