Package: curl
Version: 7.15.0-5.1
Severity: important
Tags: security

Quoting Stefan Esser:
| During a quick scan of the URL parsing code within libcurl, it was
| discovered, that certain malformed URLs trigger an off-by-one(two)
| bufferoverflow. This may lead to unintended arbitrary code execution.

| Because the attacker must be able to force curl to load such an URL,
| which is not possible through a HTTP redirect, the impact is low.
| However a local attacker might use this vulnerability to break out
| of safe_mode/open_basedir restrictions when PHP is compiled with
| libcurl support.

Please see http://www.hardened-php.net/advisory_242005.109.html for
more information; it's fixed in 7.15.1

Cheers,
        Moritz

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-2-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages curl depends on:
ii  libc6                         2.3.5-8.1  GNU C Library: Shared libraries an
ii  libcomerr2                    1.38-2     common error description library
ii  libcurl3                      7.15.0-5.1 Multi-protocol file transfer libra
ii  libidn11                      0.5.18-1   GNU libidn library, implementation
ii  libkrb53                      1.4.3-3    MIT Kerberos runtime libraries
ii  libssl0.9.8                   0.9.8a-4   SSL shared libraries
ii  zlib1g                        1:1.2.3-8  compression library - runtime

curl recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to