The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
[
    {
        "signature_version": "v1",
        "target": {
            "file": "src/tool_writeout.c"
        },
        "id": "CVE-2017-7407-503b5770",
        "source": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "119066316151948807005295019564101395011",
                "137737830742583149452429535963228918912",
                "51529351887636434842909831520961132979",
                "180982491866925066316252044149786616047"
            ]
        },
        "deprecated": false,
        "signature_type": "Line"
    },
    {
        "signature_version": "v1",
        "target": {
            "function": "ourWriteOut",
            "file": "src/tool_writeout.c"
        },
        "id": "CVE-2017-7407-defd70e3",
        "source": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13",
        "digest": {
            "function_hash": "122384078902818575986643295615648528317",
            "length": 5508.0
        },
        "deprecated": false,
        "signature_type": "Function"
    }
]