cURL/libcURL 'Curl_sasl_create_digest_md5_message()' Stack Buffer Overflow Vulnerability
PVS ID: 6901 FAMILY: Web Clients RISK: MEDIUM NESSUS ID:64869
Description: Synopsis :\n\nThe cURL program is a library and command-line tool for transferring data using various protocols, including HTTP, FTP, and LDAP. A vulnerable version of cURL was detected from the host.\n\nA stack buffer overflow flaw was found due to the application failing to properly bounds-check user supplied data before copying it into an insufficiently sized buffer. A remote attacker could exploit this issue to execute arbitrary code in the context of the affected application. (CVE-2013-2174)\n\nAffected versions include versions 7.26.0 through 7.28.1. For your information, the detected associated user-agent was : \n %L \n\n

Solution: Upgrade the affected packages; the next version of cURL that fixes the issue is cURL 7.29.0.

CVE-2013-0249


Copyright Tenable Network Security Inc. 2013