Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Titlecurl security update
Informations
NameDSA-4633First vendor Publication2020-02-22
VendorDebianLast vendor Modification2020-02-22
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score7.5Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple vulnerabilities were discovered in cURL, an URL transfer library.

CVE-2019-5436

A heap buffer overflow in the TFTP receiving code was discovered, which could allow DoS or arbitrary code execution. This only affects the oldstable distribution (stretch).

CVE-2019-5481

Thomas Vegas discovered a double-free in the FTP-KRB code, triggered by a malicious server sending a very large data block.

CVE-2019-5482

Thomas Vegas discovered a heap buffer overflow that could be triggered when a small non-default TFTP blocksize is used.

For the oldstable distribution (stretch), these problems have been fixed in version 7.52.1-5+deb9u10.

For the stable distribution (buster), these problems have been fixed in version 7.64.0-4+deb10u1.

We recommend that you upgrade your curl packages.

For the detailed security status of curl please refer to its security tracker page at: https://security-tracker.debian.org/tracker/curl

Original Source

Url : http://www.debian.org/security/2020/dsa-4633

CWE : Common Weakness Enumeration

%idName
33 %CWE-415Double Free
33 %CWE-120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE/SANS Top 25)
33 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application78
Application75

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2020-02-24 21:17:56
  • First insertion