FreeBSD : curl -- TFTP packet buffer overflow vulnerability (b8e361b8-b7ff-11da-8414-0013d4a4a40e)

High Nessus Plugin ID 21501


The remote FreeBSD host is missing one or more security-related updates.


A Project cURL Security Advisory reports :

libcurl uses the given file part of a TFTP URL in a manner that allows a malicious user to overflow a heap-based memory buffer due to the lack of boundary check.

This overflow happens if you pass in a URL with a TFTP protocol prefix ('tftp://'), using a valid host and a path part that is longer than 512 bytes.

The affected flaw can be triggered by a redirect, if curl/libcurl is told to follow redirects and an HTTP server points the client to a tftp URL with the characteristics described above.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 21501

File Name: freebsd_pkg_b8e361b8b7ff11da84140013d4a4a40e.nasl

Version: $Revision: 1.9 $

Type: local

Published: 2006/05/13

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:curl, p-cpe:/a:freebsd:freebsd:linux-curl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2006/03/20

Vulnerability Publication Date: 2006/03/20

Reference Information

CVE: CVE-2006-1061