The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.

Project Subscriptions

Vendors Products
Rhel Software Collections Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-883-1 curl security update
EUVD EUVD EUVD-2017-16431 The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
Ubuntu USN Ubuntu USN USN-3441-1 curl vulnerabilities
Ubuntu USN Ubuntu USN USN-3441-2 curl vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-16T13:44:39.758Z

Reserved: 2017-04-03T00:00:00.000Z

Link: CVE-2017-7407

cve-icon Vulnrichment

Updated: 2024-08-05T16:04:11.297Z

cve-icon NVD

Status : Deferred

Published: 2017-04-03T20:59:00.247

Modified: 2026-04-16T14:16:11.270

Link: CVE-2017-7407

cve-icon Redhat

Severity : Low

Publid Date: 2017-04-04T00:00:00Z

Links: CVE-2017-7407 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses