Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:224: curl

Vulnerability Assessment Details

MDKSA-2005:224: curl

Vulnerability Assessment Summary
Check for the version of the curl package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:224 (curl).

Stefan Esser discovered that libcurl's URL parser function can have a malloced
buffer overflows in two ways if given a too long URL. It cannot be triggered by
a redirect, which makes remote exploitation unlikely, but can be passed
directly to libcurl (permiting for local exploitation) and could also be used to
break out of PHP's safe_mode/ open_basedir. This vulnerability only exists in
libcurl and curl 7.11.2 up to and including 7.15.0, which means that Corporate
Server 2.1 and Corporate 3.0 are not vulnerable. The updated packages have been
patched to correct the problem. As well, updated php-curl packages are
available that provide a new curl PHP module compiled against the fixed code.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.