cURL/libcURL Remote Input Validation Vulnerability

medium Log Correlation Engine Plugin ID 801396
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The cURL program is a library and command-line tool for transferring data using various protocols, including HTTP, FTP, and LDAP. A vulnerable version of cURL was detected from the host.

Description

An input validation vulnerability occurs when the application fails to properly sanitize a user-supplied fileptah part of an URL before passing it to the protocol-specific code. A remote attacker could exploit this issue to execute arbitrary code in the context of the affected application. (CVE-2012-0036)

Affected versions include versions 7.20.0 through 7.23.1.


Solution

Upgrade the affected packages; the next version of cURL that fixes the issue is cURL 7.24.0.

See Also

http://www.nessus.org/u?8be7c5b1

http://curl.haxx.se/docs/adv_20120124.html

Plugin Details

Severity: Medium

ID: 801396

Family: Web Clients

Published: 7/3/2013

Updated: 7/3/2013

Nessus ID: 57897

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Patch Publication Date: 1/24/2012

Vulnerability Publication Date: 1/24/2012

Reference Information

CVE: CVE-2012-0036

BID: 51665