The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "119066316151948807005295019564101395011", "137737830742583149452429535963228918912", "51529351887636434842909831520961132979", "180982491866925066316252044149786616047" ] }, "id": "CVE-2017-7407-503b5770", "deprecated": false, "target": { "file": "src/tool_writeout.c" }, "signature_type": "Line", "source": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13" }, { "signature_version": "v1", "digest": { "length": 5508.0, "function_hash": "122384078902818575986643295615648528317" }, "id": "CVE-2017-7407-defd70e3", "deprecated": false, "target": { "file": "src/tool_writeout.c", "function": "ourWriteOut" }, "signature_type": "Function", "source": "https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13" } ] }