FreeBSD : curl -- libcurl buffer overflow vulnerability (c8c31c41-49ed-11df-83fb-0015587e2cc1)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

The cURL project reports in a security advisory :

Using the affected libcurl version to download compressed content over
HTTP, an application can ask libcurl to automatically uncompress data.
When doing so, libcurl can wrongly send data up to 64K in size to the
callback which thus is much larger than the documented maximum size.

An application that blindly trusts libcurl's max limit for a fixed
buffer size or similar is then a possible target for a buffer overflow
vulnerability.

See also :

http://curl.haxx.se/docs/adv_20100209.html
http://www.openwall.com/lists/oss-security/2010/02/09/5
http://www.nessus.org/u?e60e9422

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 45574 (freebsd_pkg_c8c31c4149ed11df83fb0015587e2cc1.nasl)

Bugtraq ID:

CVE ID: CVE-2010-0734

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now