Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200510-19 ] cURL: NTLM username stack overflow
Date: Sat, 22 Oct 2005 13:35:55
Message-Id: 435A3CAB.9010001@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200510-19
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: cURL: NTLM username stack overflow
9 Date: October 22, 2005
10 Bugs: #109097
11 ID: 200510-19
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 cURL is vulnerable to a buffer overflow which could lead to the
19 execution of arbitrary code.
20
21 Background
22 ==========
23
24 cURL is a command line tool and library for transferring files via many
25 different protocols. It supports NTLM authentication to retrieve files
26 from Windows-based systems.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 net-misc/curl < 7.15.0 >= 7.15.0
35
36 Description
37 ===========
38
39 iDEFENSE reported that insufficient bounds checking on a memcpy() of
40 the supplied NTLM username can result in a stack overflow.
41
42 Impact
43 ======
44
45 A remote attacker could setup a malicious server and entice an user to
46 connect to it using a cURL client, potentially leading to the execution
47 of arbitrary code with the permissions of the user running cURL.
48
49 Workaround
50 ==========
51
52 Disable NTLM authentication by not using the --anyauth or --ntlm
53 options when using cURL (the command line version). Workarounds for
54 programs that use the cURL library depend on the configuration options
55 presented by those programs.
56
57 Resolution
58 ==========
59
60 All cURL users should upgrade to the latest version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.0"
64
65 References
66 ==========
67
68 [ 1 ] CVE-2005-3185
69 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
70 [ 2 ] iDefense Security Advisory 10.13.05
71
72 http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
73
74 Availability
75 ============
76
77 This GLSA and any updates to it are available for viewing at
78 the Gentoo Security Website:
79
80 http://security.gentoo.org/glsa/glsa-200510-19.xml
81
82 Concerns?
83 =========
84
85 Security is a primary focus of Gentoo Linux and ensuring the
86 confidentiality and security of our users machines is of utmost
87 importance to us. Any security concerns should be addressed to
88 security@g.o or alternatively, you may file a bug at
89 http://bugs.gentoo.org.
90
91 License
92 =======
93
94 Copyright 2005 Gentoo Foundation, Inc; referenced text
95 belongs to its owner(s).
96
97 The contents of this document are licensed under the
98 Creative Commons - Attribution / Share Alike license.
99
100 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature