The latest version of cURL patches nearly a dozen vulnerabilities, more than half of which were discovered as a result of an audit conducted recently by security experts.
cURL is an open source command line tool and library designed for transferring data. cURL is used by thousands of software applications, including networking devices, printers, media equipment, phones, tablets, TVs and even cars.
Daniel Stenberg, lead developer of cURL and Mozilla employee, requested a security audit of cURL from the Mozilla Secure Open Source (SOS) program. The audit was conducted over a 20-day period in August and September by five testers at Germany-based security services provider Cure53.
The audit revealed a total of 23 issues, including nine security flaws. An analysis of the findings by cURL developers led to two of the vulnerabilities being merged and one being classified as a “plain bug” since it involved a very complicated attack scenario.
Of the nine security holes detailed in Cure53’s report, four have been rated “high severity” and four are considered “medium severity.” The high severity issues, which could lead to remote code execution, are tracked as CVE-2016-8617, CVE-2016-8619, CVE-2016-8622 and CVE-2016-8623.
Despite the significant number of flaws, Cure53 concluded that “the overall impression of the state of security and robustness of the cURL library was positive.”
The latest version of cURL, version 7.51.0, patches a total of 11 vulnerabilities. In addition to the seven issues found by Cure53, flaws were also reported by Luật Nguyễn, Christian Heimes and Fernando Muñoz. Stenberg pointed out that before this security audit, the highest number of vulnerabilities fixed in a single release was four.
“I applied for the security audit because I feel that we’ve had some security related issues lately and I’ve had the feeling that we might be missing something so it would be really good to get some experts’ eyes on the code,” Stenberg said in a blog post. “Also, as curl is one of the most used software components in the world a serious problem in curl could have a serious impact on tools, devices and applications everywhere. We don’t want that to happen.”
Related: Code Execution Flaws Patched in HDF5 Library
Related: OpenJPEG Flaw Allows Code Execution via Malicious Image Files
Related: Several Vulnerabilities Patched in Libarchive Library

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
Latest News
- Sentra Raises $30 Million for DSPM Technology
- Cyber Insights 2023: Cyberinsurance
- Cyber Insights 2023: Attack Surface Management
- Cyber Insights 2023: Artificial Intelligence
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- Guardz Emerges From Stealth Mode With $10 Million in Funding
- How the Atomized Network Changed Enterprise Protection
- Critical QNAP Vulnerability Leads to Code Injection
