Debian: DSA-3992-1: curl security update

    Date06 Oct 2017
    CategoryDebian
    81
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in cURL, an URL transfer library. The Common Vulnerabilities and Exposures project identifies the following problems:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3992-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    October 06, 2017                      https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : curl
    CVE ID         : CVE-2017-1000100 CVE-2017-1000101 CVE-2017-1000254
    Debian Bug     : 871554 871555 877671
    
    Several vulnerabilities have been discovered in cURL, an URL transfer
    library. The Common Vulnerabilities and Exposures project identifies the
    following problems:
    
    CVE-2017-1000100
    
        Even Rouault reported that cURL does not properly handle long file
        names when doing an TFTP upload. A malicious HTTP(S) server can take
        advantage of this flaw by redirecting a client using the cURL
        library to a crafted TFTP URL and trick it to send private memory
        contents to a remote server over UDP.
    
    CVE-2017-1000101
    
        Brian Carpenter and Yongji Ouyang reported that cURL contains a flaw
        in the globbing function that parses the numerical range, leading to
        an out-of-bounds read when parsing a specially crafted URL.
    
    CVE-2017-1000254
    
        Max Dymond reported that cURL contains an out-of-bounds read flaw in
        the FTP PWD response parser. A malicious server can take advantage
        of this flaw to effectively prevent a client using the cURL library
        to work with it, causing a denial of service.
    
    For the oldstable distribution (jessie), these problems have been fixed
    in version 7.38.0-4+deb8u6.
    
    For the stable distribution (stretch), these problems have been fixed in
    version 7.52.1-5+deb9u1.
    
    We recommend that you upgrade your curl packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.