F5 Networks BIG-IP : cURL buffer overflow vulnerability (SOL4447)

medium Nessus Plugin ID 78203

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

Solution

Upgrade to one of the non-vulnerable versions listed in the F5 Solution SOL4447.

See Also

https://support.f5.com/csp/article/K4447

Plugin Details

Severity: Medium

ID: 78203

File Name: f5_bigip_SOL4447.nasl

Version: 1.8

Type: local

Published: 10/10/2014

Updated: 1/11/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:f5:big-ip_local_traffic_manager, cpe:/h:f5:big-ip

Required KB Items: Host/local_checks_enabled, Host/BIG-IP/hotfix, Host/BIG-IP/modules, Host/BIG-IP/version

Patch Publication Date: 5/16/2007

Reference Information

CVE: CVE-2005-0490