Package: curl Version: 7.15.0-5.1 Severity: important Tags: security Quoting Stefan Esser: | During a quick scan of the URL parsing code within libcurl, it was | discovered, that certain malformed URLs trigger an off-by-one(two) | bufferoverflow. This may lead to unintended arbitrary code execution.
| Because the attacker must be able to force curl to load such an URL, | which is not possible through a HTTP redirect, the impact is low. | However a local attacker might use this vulnerability to break out | of safe_mode/open_basedir restrictions when PHP is compiled with | libcurl support. Please see http://www.hardened-php.net/advisory_242005.109.html for more information; it's fixed in 7.15.1 Cheers, Moritz -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14-2-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages curl depends on: ii libc6 2.3.5-8.1 GNU C Library: Shared libraries an ii libcomerr2 1.38-2 common error description library ii libcurl3 7.15.0-5.1 Multi-protocol file transfer libra ii libidn11 0.5.18-1 GNU libidn library, implementation ii libkrb53 1.4.3-3 MIT Kerberos runtime libraries ii libssl0.9.8 0.9.8a-4 SSL shared libraries ii zlib1g 1:1.2.3-8 compression library - runtime curl recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]