CVE-2017-7407
Published: August 31, 2023Last modified: December 15, 2025
Description
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 2.4 |
| Attack Vector | PHYSICAL |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | LOW |
| Integrity impact | NONE |
| Availability impact | NONE |
| Vector | CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | curl | Not affected (8.2.1-r0) |
| Stream | curl | Not affected (8.2.1-r0) | |
| Hardened Containers | Stream | curl | Not affected (8.2.1-r0) |