Joined: 27 Jun 2003
Location: Gothenburg, Sweden
|Posted: Wed Mar 16, 2005 6:17 pm Post subject: [ GLSA 200503-20 ] curl: NTLM response buffer overflow
|Gentoo Linux Security Advisory
Title: curl: NTLM response buffer overflow (GLSA 200503-20)
Date: March 16, 2005
curl is vulnerable to a buffer overflow which could lead to the execution of arbitrary code.
curl is a command line tool for transferring files via many different protocols.
Vulnerable: < 7.13.1
Unaffected: >= 7.13.1
Architectures: All supported architectures
curl fails to properly check boundaries when handling NTLM authentication.
With a malicious server an attacker could send a carefully crafted NTLM response to a connecting client leading to the execution of arbitrary code with the permissions of the user running curl.
Disable NTLM authentication by not using the --anyauth or --ntlm options.
All curl users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1"
Last edited by GLSA on Sun May 07, 2006 4:55 pm; edited 1 time in total