Executive Summary

Title curl vulnerability
Name USN-4129-2 First vendor Publication 2019-09-12
Vendor Ubuntu Last vendor Modification 2019-09-12
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores


A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM - Ubuntu 12.04 ESM


curl could be made to crash or possibly execute arbitrary code if it incorrectly handled memory during TFTP transfers.

Software Description: - curl: HTTP, HTTPS, and FTP client and client libraries


USN-4129-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 12.04 ESM and 14.04 ESM.

Original advisory details:

Thomas Vegas discovered that curl incorrectly handled memory during TFTP
transfers. A remote attacker could use this issue to crash curl, resulting
in a denial of service, or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM:
curl 7.35.0-1ubuntu2.20+esm3
libcurl3 7.35.0-1ubuntu2.20+esm3
libcurl3-gnutls 7.35.0-1ubuntu2.20+esm3
libcurl3-nss 7.35.0-1ubuntu2.20+esm3

Ubuntu 12.04 ESM:
curl 7.22.0-3ubuntu4.27
libcurl3 7.22.0-3ubuntu4.27
libcurl3-gnutls 7.22.0-3ubuntu4.27
libcurl3-nss 7.22.0-3ubuntu4.27

In general, a standard system update will make all the necessary changes.


Original Source

Url : http://www.ubuntu.com/usn/USN-4129-2

Alert History

If you want to see full details history, please login or register.
Date Informations
2019-09-13 00:19:10
  • First insertion