The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2014-11-15 20:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-3707
Mitre link : CVE-2014-3707
CVE.ORG link : CVE-2014-3707
JSON object : View
Products Affected
opensuse
- opensuse
debian
- debian_linux
oracle
- hyperion
haxx
- libcurl
apple
- mac_os_x
canonical
- ubuntu_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor