Ubuntu 4.10 / 5.04 / 5.10 : curl vulnerability (USN-228-1)

Ubuntu Security Notice (C) 2005-2013 Canonical, Inc. / NASL script (C) 2006-2013 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Stefan Esser discovered several buffer overflows in the handling of
URLs. By attempting to load an URL with a specially crafted invalid
hostname, a local attacker could exploit this to execute arbitrary
code with the privileges of the application that uses the cURL

It is not possible to trick cURL into loading a malicious URL with an
HTTP redirect, so this vulnerability was usually not exploitable
remotely. However, it could be exploited locally to e. g. circumvent
PHP security restrictions.

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 20771 ()

Bugtraq ID:

CVE ID: CVE-2005-4077