cURL/libcURL 'Curl_sasl_create_digest_md5_message()' Stack Buffer Overflow Vulnerability

medium Log Correlation Engine Plugin ID 801393
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The cURL program is a library and command-line tool for transferring data using various protocols, including HTTP, FTP, and LDAP. A vulnerable version of cURL was detected from the host.

Description

A stack buffer overflow flaw was found due to the application failing to properly bounds-check user supplied data before copying it into an insufficiently sized buffer. A remote attacker could exploit this issue to execute arbitrary code in the context of the affected application. (CVE-2013-2174)

Affected versions include versions 7.26.0 through 7.28.1.


Solution

Upgrade the affected packages; the next version of cURL that fixes the issue is cURL 7.29.0.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=906779

http://curl.haxx.se/docs/adv_20130206.html

Plugin Details

Severity: Medium

ID: 801393

Family: Web Clients

Published: 7/1/2013

Updated: 7/1/2013

Nessus ID: 64869

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Patch Publication Date: 2/8/2013

Vulnerability Publication Date: 2/6/2013

Reference Information

CVE: CVE-2013-0249

BID: 57842