Search for packages
purl | pkg:alpm/archlinux/lib32-curl@7.56.1-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2297-mgsv-aaaa
Aliases: CVE-2017-8816 |
The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields. |
Affected by 2 other vulnerabilities. |
VCID-em94-9gvm-aaah
Aliases: CVE-2017-8818 |
curl and libcurl before 7.57.0 on 32-bit platforms allow attackers to cause a denial of service (out-of-bounds access and application crash) or possibly have unspecified other impact because too little memory is allocated for interfacing to an SSL library. |
Affected by 2 other vulnerabilities. |
VCID-gs8e-s85k-aaaq
Aliases: CVE-2017-8817 |
The FTP wildcard function in curl and libcurl before 7.57.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) or possibly have unspecified other impact via a string that ends with an '[' character. |
Affected by 2 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-4t2f-bfv9-aaan | An IMAP FETCH response line indicates the size of the returned data, in number of bytes. When that response says the data is zero bytes, libcurl would pass on that (non-existing) data with a pointer and the size (zero) to the deliver-data function. libcurl's deliver-data function treats zero as a magic number and invokes strlen() on the data to figure out the length. The strlen() is called on a heap based buffer that might not be zero terminated so libcurl might read beyond the end of it into whatever memory lies after (or just crash) and then deliver that to the application as if it was actually downloaded. |
CVE-2017-1000257
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:46:56.946723+00:00 | Arch Linux Importer | Fixing | VCID-4t2f-bfv9-aaan | https://security.archlinux.org/AVG-466 | 36.0.0 |
2025-03-28T07:46:08.541721+00:00 | Arch Linux Importer | Affected by | VCID-2297-mgsv-aaaa | https://security.archlinux.org/AVG-521 | 36.0.0 |
2025-03-28T07:46:08.521003+00:00 | Arch Linux Importer | Affected by | VCID-gs8e-s85k-aaaq | https://security.archlinux.org/AVG-521 | 36.0.0 |
2025-03-28T07:46:08.500566+00:00 | Arch Linux Importer | Affected by | VCID-em94-9gvm-aaah | https://security.archlinux.org/AVG-521 | 36.0.0 |
2024-12-11T10:54:40.166029+00:00 | Arch Linux Importer | Fixing | VCID-4t2f-bfv9-aaan | https://security.archlinux.org/AVG-466 | 35.0.0 |
2024-12-11T10:54:21.508110+00:00 | Arch Linux Importer | Affected by | VCID-2297-mgsv-aaaa | https://security.archlinux.org/AVG-521 | 35.0.0 |
2024-12-11T10:54:21.131037+00:00 | Arch Linux Importer | Affected by | VCID-gs8e-s85k-aaaq | https://security.archlinux.org/AVG-521 | 35.0.0 |
2024-12-11T10:54:20.760151+00:00 | Arch Linux Importer | Affected by | VCID-em94-9gvm-aaah | https://security.archlinux.org/AVG-521 | 35.0.0 |
2024-09-18T02:02:18.300847+00:00 | Arch Linux Importer | Fixing | VCID-4t2f-bfv9-aaan | https://security.archlinux.org/AVG-466 | 34.0.1 |
2024-09-18T02:01:17.320119+00:00 | Arch Linux Importer | Affected by | VCID-2297-mgsv-aaaa | https://security.archlinux.org/AVG-521 | 34.0.1 |
2024-09-18T02:01:17.280115+00:00 | Arch Linux Importer | Affected by | VCID-gs8e-s85k-aaaq | https://security.archlinux.org/AVG-521 | 34.0.1 |
2024-09-18T02:01:17.245603+00:00 | Arch Linux Importer | Affected by | VCID-em94-9gvm-aaah | https://security.archlinux.org/AVG-521 | 34.0.1 |
2024-01-31T12:10:00.633336+00:00 | Arch Linux Importer | Fixing | VCID-4t2f-bfv9-aaan | https://security.archlinux.org/AVG-466 | 34.0.0rc2 |
2024-01-31T12:09:58.061857+00:00 | Arch Linux Importer | Affected by | VCID-2297-mgsv-aaaa | https://security.archlinux.org/AVG-521 | 34.0.0rc2 |
2024-01-31T12:09:58.040078+00:00 | Arch Linux Importer | Affected by | VCID-gs8e-s85k-aaaq | https://security.archlinux.org/AVG-521 | 34.0.0rc2 |
2024-01-31T12:09:58.018127+00:00 | Arch Linux Importer | Affected by | VCID-em94-9gvm-aaah | https://security.archlinux.org/AVG-521 | 34.0.0rc2 |
2024-01-03T22:28:20.118231+00:00 | Arch Linux Importer | Fixing | VCID-4t2f-bfv9-aaan | https://security.archlinux.org/AVG-466 | 34.0.0rc1 |
2024-01-03T22:27:28.575287+00:00 | Arch Linux Importer | Affected by | VCID-2297-mgsv-aaaa | https://security.archlinux.org/AVG-521 | 34.0.0rc1 |
2024-01-03T22:27:28.548907+00:00 | Arch Linux Importer | Affected by | VCID-gs8e-s85k-aaaq | https://security.archlinux.org/AVG-521 | 34.0.0rc1 |
2024-01-03T22:27:28.522863+00:00 | Arch Linux Importer | Affected by | VCID-em94-9gvm-aaah | https://security.archlinux.org/AVG-521 | 34.0.0rc1 |