CVE-2017-1000100

6.5 MEDIUM
Published: October 05, 2017 Modified: April 16, 2026
View on NVD

Description

When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/100286
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039118
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://curl.haxx.se/docs/adv_20170809B.html
Source: cve@mitre.org
Patch Vendor Advisory
https://security.gentoo.org/glsa/201709-14
Source: cve@mitre.org
Patch Third Party Advisory VDB Entry
http://www.debian.org/security/2017/dsa-3992
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/100286
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039118
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:3558
Source: af854a3a-2127-422b-91ae-364da2661108
https://curl.haxx.se/docs/adv_20170809B.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://security.gentoo.org/glsa/201709-14
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
https://support.apple.com/HT208221
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
6.5 / 10.0
EPSS (Exploit Probability)
0.8%
74th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

haxx