Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200503-20 ] curl: NTLM response buffer overflow
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Administrator
Administrator


Joined: 27 Jun 2003
Posts: 4838
Location: Gothenburg, Sweden

PostPosted: Wed Mar 16, 2005 6:17 pm    Post subject: [ GLSA 200503-20 ] curl: NTLM response buffer overflow Reply with quote

Gentoo Linux Security Advisory

Title: curl: NTLM response buffer overflow (GLSA 200503-20)
Severity: normal
Exploitable: remote
Date: March 16, 2005
Bug(s): #82534
ID: 200503-20

Synopsis

curl is vulnerable to a buffer overflow which could lead to the execution of arbitrary code.

Background

curl is a command line tool for transferring files via many different protocols.

Affected Packages

Package: net-misc/curl
Vulnerable: < 7.13.1
Unaffected: >= 7.13.1
Architectures: All supported architectures


Description

curl fails to properly check boundaries when handling NTLM authentication.

Impact

With a malicious server an attacker could send a carefully crafted NTLM response to a connecting client leading to the execution of arbitrary code with the permissions of the user running curl.

Workaround

Disable NTLM authentication by not using the --anyauth or --ntlm options.

Resolution

All curl users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1"


References

CAN-2005-0490


Last edited by GLSA on Sun May 07, 2006 4:55 pm; edited 1 time in total
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum