FreeBSD : curl -- TFTP packet buffer overflow vulnerability (b8e361b8-b7ff-11da-8414-0013d4a4a40e)

high Nessus Plugin ID 21501

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

A Project cURL Security Advisory reports :

libcurl uses the given file part of a TFTP URL in a manner that allows a malicious user to overflow a heap-based memory buffer due to the lack of boundary check.

This overflow happens if you pass in a URL with a TFTP protocol prefix ('tftp://'), using a valid host and a path part that is longer than 512 bytes.

The affected flaw can be triggered by a redirect, if curl/libcurl is told to follow redirects and an HTTP server points the client to a tftp URL with the characteristics described above.

Solution

Update the affected packages.

See Also

https://curl.haxx.se/docs/CVE-2006-1061.html

http://www.nessus.org/u?b9d684df

Plugin Details

Severity: High

ID: 21501

File Name: freebsd_pkg_b8e361b8b7ff11da84140013d4a4a40e.nasl

Version: 1.13

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:curl, p-cpe:/a:freebsd:freebsd:linux-curl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 3/20/2006

Vulnerability Publication Date: 3/20/2006

Reference Information

CVE: CVE-2006-1061