Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2017-1000257
Description:An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded.
Test IDs: 1.3.6.1.4.1.25623.1.0.882804   1.3.6.1.4.1.25623.1.1.2.2017.1312   1.3.6.1.4.1.25623.1.0.873554   1.3.6.1.4.1.25623.1.1.2.2018.1237   1.3.6.1.4.1.25623.1.0.704007   1.3.6.1.4.1.25623.1.1.2.2017.1313   1.3.6.1.4.1.25623.1.0.891143   1.3.6.1.4.1.25623.1.0.812308   1.3.6.1.4.1.25623.1.0.843347   1.3.6.1.4.1.25623.1.1.13.2017.297.01  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2017-1000257
BugTraq ID: 101519
http://www.securityfocus.com/bid/101519
Debian Security Information: DSA-4007 (Google Search)
http://www.debian.org/security/2017/dsa-4007
https://security.gentoo.org/glsa/201712-04
RedHat Security Advisories: RHSA-2017:3263
https://access.redhat.com/errata/RHSA-2017:3263
RedHat Security Advisories: RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:2486
RedHat Security Advisories: RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2018:3558
http://www.securitytracker.com/id/1039644




© 1998-2025 E-Soft Inc. All rights reserved.