libcurl.so is vulnerable to arbitrary code execution. When built with SSPI or telnet is enabled, a local user is able to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.
CPE | Name | Operator | Version |
---|---|---|---|
curl | le | 7.30.0.2 | |
libcurl.so | le | 4.7.0.debug | |
curl | le | 7.30.0.2 | |
libcurl.so | le | 4.7.0.debug |