ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [SA17907] cURL/libcURL URL Parsing Off-By-One Vulnerability



> 
> TITLE:
> cURL/libcURL URL Parsing Off-By-One Vulnerability
> 
> SECUNIA ADVISORY ID:
> SA17907
> 
> VERIFY ADVISORY:
> http://secunia.com/advisories/17907/
> 
> CRITICAL:
> Less critical
> 
> IMPACT:
> Unknown
> 
> WHERE:
> Local system
> 
> SOFTWARE:
> cURL 7.x
> http://secunia.com/product/4691/
> 
> DESCRIPTION:
> Stefan Esser has reported a vulnerability in cURL/libcURL, which has
> an unknown impact.
> 
> The vulnerability is caused due to an off-by-one error when parsing
> an URL that is longer than 256 bytes. By using a specially crafted
> URL, a two-byte overflow is reportedly possible. This may be
> exploited to corrupt memory allocation structures.  The vulnerability
> is reportedly exploitable only via a direct request to cURL and not
> via a redirect.
> 
> The vulnerability has been reported in version 7.15.0 and prior.
> 
> NOTE: The actual impact of this vulnerability depends on the
> application (e.g. PHP) that uses the cURL library.
> 
> SOLUTION:
> Update to version 7.15.1.
> http://curl.haxx.se/download.html
> 
> PROVIDED AND/OR DISCOVERED BY:
> Stefan Esser, Hardened PHP Project.
> 
> ORIGINAL ADVISORY:
> http://www.hardened-php.net/advisory_242005.109.html
> 
> ----------------------------------------------------------------------




 




Copyright © Lexa Software, 1996-2009.