FreeBSD : curl -- TFTP packet buffer overflow vulnerability (b8e361b8-b7ff-11da-8414-0013d4a4a40e)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Project cURL Security Advisory reports :

libcurl uses the given file part of a TFTP URL in a manner that allows
a malicious user to overflow a heap-based memory buffer due to the
lack of boundary check.

This overflow happens if you pass in a URL with a TFTP protocol prefix
('tftp://'), using a valid host and a path part that is longer than
512 bytes.

The affected flaw can be triggered by a redirect, if curl/libcurl is
told to follow redirects and an HTTP server points the client to a
tftp URL with the characteristics described above.

See also :

http://curl.haxx.se/docs/adv_20060320.html
http://www.nessus.org/u?9bb932df

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21501 (freebsd_pkg_b8e361b8b7ff11da84140013d4a4a40e.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1061

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now