EulerOS 2.0 SP1 : curl (EulerOS-SA-2017-1036)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the curl packages installed, the EulerOS
installation on the remote host is affected by the following
vulnerabilities :

- Multiple integer overflows in the (1) curl_escape, (2)
curl_easy_escape, (3) curl_unescape, and (4)
curl_easy_unescape functions in libcurl before 7.50.3
allow attackers to have unspecified impact via a string
of length 0xffffffff, which triggers a heap-based
buffer overflow.(CVE-2016-7167)

- ** RESERVED ** This candidate has been reserved by an
organization or individual that will use it when
announcing a new security problem. When the candidate
has been publicized, the details for this candidate
will be
provided.(CVE-2016-8615,CVE-2016-8616,CVE-2016-8617,CVE
-2016-8618,CVE-2016-8619,CVE-2016-8621,CVE-2016-8622,CV
E-2016-8623,CVE-2016-8624)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?743ba312

Solution :

Update the affected curl packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now