Slackware 10.0 / 10.1 / 10.2 / 8.1 / 9.0 / 9.1 / current : curl/wget (SSA:2005-310-01)

high Nessus Plugin ID 20149

Synopsis

The remote Slackware host is missing a security update.

Description

New curl packages are available for Slackware 9.1, 10.0, 10.1, 10.2, and -current, and new wget packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current. These address a buffer overflow in NTLM handling which may present a security problem, though no public exploits are known at this time.

Solution

Update the affected curl and / or wget packages.

See Also

http://www.nessus.org/u?642e50a1

Plugin Details

Severity: High

ID: 20149

File Name: Slackware_SSA_2005-310-01.nasl

Version: 1.15

Type: local

Published: 11/7/2005

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:curl, p-cpe:/a:slackware:slackware_linux:wget, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:10.0, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:10.2, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0, cpe:/o:slackware:slackware_linux:9.1

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 11/6/2005

Vulnerability Publication Date: 10/13/2005

Reference Information

CVE: CVE-2005-3185

SSA: 2005-310-01