Linux Security
Linux Security
Linux Security

Debian: DSA-3992-1: curl security update

Date 06 Oct 2017
250
Posted By LinuxSecurity Advisories
Several vulnerabilities have been discovered in cURL, an URL transfer library. The Common Vulnerabilities and Exposures project identifies the following problems:

- -------------------------------------------------------------------------
Debian Security Advisory DSA-3992-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                     Salvatore Bonaccorso
October 06, 2017                      https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : curl
CVE ID         : CVE-2017-1000100 CVE-2017-1000101 CVE-2017-1000254
Debian Bug     : 871554 871555 877671

Several vulnerabilities have been discovered in cURL, an URL transfer
library. The Common Vulnerabilities and Exposures project identifies the
following problems:

CVE-2017-1000100

    Even Rouault reported that cURL does not properly handle long file
    names when doing an TFTP upload. A malicious HTTP(S) server can take
    advantage of this flaw by redirecting a client using the cURL
    library to a crafted TFTP URL and trick it to send private memory
    contents to a remote server over UDP.

CVE-2017-1000101

    Brian Carpenter and Yongji Ouyang reported that cURL contains a flaw
    in the globbing function that parses the numerical range, leading to
    an out-of-bounds read when parsing a specially crafted URL.

CVE-2017-1000254

    Max Dymond reported that cURL contains an out-of-bounds read flaw in
    the FTP PWD response parser. A malicious server can take advantage
    of this flaw to effectively prevent a client using the cURL library
    to work with it, causing a denial of service.

For the oldstable distribution (jessie), these problems have been fixed
in version 7.38.0-4+deb8u6.

For the stable distribution (stretch), these problems have been fixed in
version 7.52.1-5+deb9u1.

We recommend that you upgrade your curl packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"45","type":"x","order":"1","pct":80.36,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"6","type":"x","order":"2","pct":10.71,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":8.93,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.