Gentoo Archives: gentoo-announce

From: Matthias Geerdsen <vorlon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200603-19 ] cURL/libcurl: Buffer overflow in the handling of TFTP URLs
Date: Tue, 21 Mar 2006 21:01:35
Message-Id: 4420651D.40705@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200603-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: cURL/libcurl: Buffer overflow in the handling of TFTP URLs
9 Date: March 21, 2006
10 Bugs: #125766
11 ID: 200603-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 libcurl is affected by a buffer overflow in the handling of URLs for
19 the TFTP protocol, which could be exploited to compromise a user's
20 system.
21
22 Background
23 ==========
24
25 cURL is a command line tool for transferring files with URL syntax,
26 supporting numerous protocols. libcurl is the corresponding client-side
27 library.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 net-misc/curl < 7.15.3 *>= 7.15.1-r1
36 >= 7.15.3
37 <= 7.14.1
38
39 Description
40 ===========
41
42 Ulf Harnhammar reported a possible buffer overflow in the handling of
43 TFTP URLs in libcurl due to the lack of boundary checks.
44
45 Impact
46 ======
47
48 An attacker could exploit this vulnerability to compromise a user's
49 system by enticing the user to request a malicious URL with
50 cURL/libcurl or to use a HTTP server redirecting to a malicious TFTP
51 URL.
52
53 Workaround
54 ==========
55
56 There is no known workaround at this time.
57
58 Resolution
59 ==========
60
61 All cURL users should upgrade to the latest version:
62
63 # emerge --sync
64 # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.1-r1"
65
66 References
67 ==========
68
69 [ 1 ] Project cURL Security Advisory, March 20th 2006
70 http://curl.haxx.se/docs/adv_20060320.html
71 [ 2 ] CVE-2006-1061
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200603-19.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2006 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature