Vulnerability Details CVE-2016-8618
The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.015
EPSS Ranking 80.4%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 7.5
Products affected by CVE-2016-8618
-
-
-
-
-
-
-
cpe:2.3:a:haxx:curl:6.3.1
-
-
-
cpe:2.3:a:haxx:curl:6.5.1
-
cpe:2.3:a:haxx:curl:6.5.2
-
-
cpe:2.3:a:haxx:curl:7.1.1
-
-
cpe:2.3:a:haxx:curl:7.10.1
-
cpe:2.3:a:haxx:curl:7.10.2
-
cpe:2.3:a:haxx:curl:7.10.3
-
cpe:2.3:a:haxx:curl:7.10.4
-
cpe:2.3:a:haxx:curl:7.10.5
-
cpe:2.3:a:haxx:curl:7.10.6
-
cpe:2.3:a:haxx:curl:7.10.7
-
cpe:2.3:a:haxx:curl:7.10.8
-
cpe:2.3:a:haxx:curl:7.11.0
-
cpe:2.3:a:haxx:curl:7.11.1
-
cpe:2.3:a:haxx:curl:7.11.2
-
cpe:2.3:a:haxx:curl:7.12.0
-
cpe:2.3:a:haxx:curl:7.12.1
-
cpe:2.3:a:haxx:curl:7.12.2
-
cpe:2.3:a:haxx:curl:7.12.3
-
cpe:2.3:a:haxx:curl:7.13.0
-
cpe:2.3:a:haxx:curl:7.13.1
-
cpe:2.3:a:haxx:curl:7.13.2
-
cpe:2.3:a:haxx:curl:7.14.0
-
cpe:2.3:a:haxx:curl:7.14.1
-
cpe:2.3:a:haxx:curl:7.15.0
-
cpe:2.3:a:haxx:curl:7.15.1
-
cpe:2.3:a:haxx:curl:7.15.2
-
cpe:2.3:a:haxx:curl:7.15.3
-
cpe:2.3:a:haxx:curl:7.15.4
-
cpe:2.3:a:haxx:curl:7.15.5
-
cpe:2.3:a:haxx:curl:7.16.0
-
cpe:2.3:a:haxx:curl:7.16.1
-
cpe:2.3:a:haxx:curl:7.16.2
-
cpe:2.3:a:haxx:curl:7.16.3
-
cpe:2.3:a:haxx:curl:7.16.4
-
cpe:2.3:a:haxx:curl:7.17.0
-
cpe:2.3:a:haxx:curl:7.17.1
-
cpe:2.3:a:haxx:curl:7.18.0
-
cpe:2.3:a:haxx:curl:7.18.1
-
cpe:2.3:a:haxx:curl:7.18.2
-
cpe:2.3:a:haxx:curl:7.19.0
-
cpe:2.3:a:haxx:curl:7.19.1
-
cpe:2.3:a:haxx:curl:7.19.2
-
cpe:2.3:a:haxx:curl:7.19.3
-
cpe:2.3:a:haxx:curl:7.19.4
-
cpe:2.3:a:haxx:curl:7.19.5
-
cpe:2.3:a:haxx:curl:7.19.6
-
cpe:2.3:a:haxx:curl:7.19.7
-
cpe:2.3:a:haxx:curl:7.19.7-53
-
-
cpe:2.3:a:haxx:curl:7.2.1
-
cpe:2.3:a:haxx:curl:7.20.0
-
cpe:2.3:a:haxx:curl:7.20.1
-
cpe:2.3:a:haxx:curl:7.21.0
-
cpe:2.3:a:haxx:curl:7.21.1
-
cpe:2.3:a:haxx:curl:7.21.2
-
cpe:2.3:a:haxx:curl:7.21.3
-
cpe:2.3:a:haxx:curl:7.21.4
-
cpe:2.3:a:haxx:curl:7.21.5
-
cpe:2.3:a:haxx:curl:7.21.6
-
cpe:2.3:a:haxx:curl:7.21.7
-
cpe:2.3:a:haxx:curl:7.22.0
-
cpe:2.3:a:haxx:curl:7.23.0
-
cpe:2.3:a:haxx:curl:7.23.1
-
cpe:2.3:a:haxx:curl:7.24.0
-
cpe:2.3:a:haxx:curl:7.25.0
-
cpe:2.3:a:haxx:curl:7.26.0
-
cpe:2.3:a:haxx:curl:7.27.0
-
cpe:2.3:a:haxx:curl:7.28.0
-
cpe:2.3:a:haxx:curl:7.28.1
-
cpe:2.3:a:haxx:curl:7.29.0
-
-
cpe:2.3:a:haxx:curl:7.30.0
-
cpe:2.3:a:haxx:curl:7.31.0
-
cpe:2.3:a:haxx:curl:7.32.0
-
cpe:2.3:a:haxx:curl:7.33.0
-
cpe:2.3:a:haxx:curl:7.34.0
-
cpe:2.3:a:haxx:curl:7.35.0
-
cpe:2.3:a:haxx:curl:7.36.0
-
cpe:2.3:a:haxx:curl:7.37.0
-
cpe:2.3:a:haxx:curl:7.37.1
-
cpe:2.3:a:haxx:curl:7.38.0
-
cpe:2.3:a:haxx:curl:7.39.0
-
-
cpe:2.3:a:haxx:curl:7.4.1
-
cpe:2.3:a:haxx:curl:7.4.2
-
cpe:2.3:a:haxx:curl:7.40.0
-
cpe:2.3:a:haxx:curl:7.41.0
-
cpe:2.3:a:haxx:curl:7.42.0
-
cpe:2.3:a:haxx:curl:7.42.1
-
cpe:2.3:a:haxx:curl:7.43.0
-
cpe:2.3:a:haxx:curl:7.44.0
-
cpe:2.3:a:haxx:curl:7.45.0
-
cpe:2.3:a:haxx:curl:7.46.0
-
cpe:2.3:a:haxx:curl:7.47.0
-
cpe:2.3:a:haxx:curl:7.47.1
-
cpe:2.3:a:haxx:curl:7.48.0
-
cpe:2.3:a:haxx:curl:7.49.0
-
cpe:2.3:a:haxx:curl:7.49.1
-
-
cpe:2.3:a:haxx:curl:7.5.1
-
cpe:2.3:a:haxx:curl:7.5.2
-
cpe:2.3:a:haxx:curl:7.50.0
-
cpe:2.3:a:haxx:curl:7.50.1
-
cpe:2.3:a:haxx:curl:7.50.2
-
cpe:2.3:a:haxx:curl:7.50.3
-
-
cpe:2.3:a:haxx:curl:7.6.1
-
-
cpe:2.3:a:haxx:curl:7.7.1
-
cpe:2.3:a:haxx:curl:7.7.2
-
cpe:2.3:a:haxx:curl:7.7.3
-
-
cpe:2.3:a:haxx:curl:7.8.1
-
-
cpe:2.3:a:haxx:curl:7.9.1
-
cpe:2.3:a:haxx:curl:7.9.2
-
cpe:2.3:a:haxx:curl:7.9.3
-
cpe:2.3:a:haxx:curl:7.9.4
-
cpe:2.3:a:haxx:curl:7.9.5
-
cpe:2.3:a:haxx:curl:7.9.6
-
cpe:2.3:a:haxx:curl:7.9.7
-
cpe:2.3:a:haxx:curl:7.9.8