Executive Summary
Summary | |
---|---|
Title | curl security update |
Informations | |||
---|---|---|---|
Name | RHSA-2005:875 | First vendor Publication | 2005-12-20 |
Vendor | RedHat | Last vendor Modification | 2005-12-20 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.6 | Attack Range | Local |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated curl packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. Stefan Esser discovered an off-by-one bug in curl. It may be possible to execute arbitrary code on a user's machine if the user can be tricked into executing curl with a carefully crafted URL. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-4077 to this issue. All users of curl are advised to upgrade to these updated packages, which contain a backported patch that resolves this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 175266 - CVE-2005-4077 SA17907 cURL/libcURL URL Parsing Off-By-One Vulnerability |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2005-875.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10855 | |||
Oval ID: | oval:org.mitre.oval:def:10855 | ||
Title: | Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string. | ||
Description: | Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-4077 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200512-09 (cURL) File : nvt/glsa_200512_09.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200603-25 (openoffice openoffice-bin) File : nvt/glsa_200603_25.nasl |
2008-09-04 | Name : FreeBSD Ports: curl File : nvt/freebsd_curl0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 919-1 (curl) File : nvt/deb_919_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 919-2 (curl) File : nvt/deb_919_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
21509 | cURL/libcURL Crafted URL Parsing Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-03-19 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-002.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-919.nasl - Type : ACT_GATHER_INFO |
2006-07-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2005-875.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_9b4facec676111da99f600123ffe8333.nasl - Type : ACT_GATHER_INFO |
2006-05-12 | Name : The remote operating system is missing a vendor-supplied patch. File : macosx_SecUpd2006-003.nasl - Type : ACT_GATHER_INFO |
2006-03-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200603-25.nasl - Type : ACT_GATHER_INFO |
2006-01-21 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-228-1.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-224.nasl - Type : ACT_GATHER_INFO |
2005-12-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-875.nasl - Type : ACT_GATHER_INFO |
2005-12-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200512-09.nasl - Type : ACT_GATHER_INFO |
2005-12-15 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-1136.nasl - Type : ACT_GATHER_INFO |
2005-12-15 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-1137.nasl - Type : ACT_GATHER_INFO |
2005-12-11 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-1129.nasl - Type : ACT_GATHER_INFO |
2005-12-11 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-1130.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:49 |
|