Unrated severityNVD Advisory· Published Mar 21, 2006· Updated Apr 16, 2026
CVE-2006-1061
CVE-2006-1061
Description
Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- secunia.com/advisories/19271nvdPatchVendor Advisory
- archives.neohapsis.com/archives/fulldisclosure/2006-03/1326.htmlnvd
- curl.haxx.se/docs/adv_20060320.htmlnvd
- secunia.com/advisories/19335nvd
- secunia.com/advisories/19344nvd
- secunia.com/advisories/19371nvd
- www.gentoo.org/security/en/glsa/glsa-200603-19.xmlnvd
- www.osvdb.org/23982nvd
- www.redhat.com/archives/fedora-announce-list/2006-March/msg00048.htmlnvd
- www.securityfocus.com/bid/17154nvd
- www.trustix.org/errata/2006/0016nvd
- www.vupen.com/english/advisories/2006/1008nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/25318nvd
News mentions
0No linked articles in our index yet.