| From: |
| Marc Deslauriers <marc.deslauriers@canonical.com> |
| To: |
| ubuntu-security-announce@lists.ubuntu.com |
| Subject: |
| [USN-1721-1] curl vulnerability |
| Date: |
| Tue, 12 Feb 2013 15:40:29 -0500 |
| Message-ID: |
| <511AA8BD.1000607@canonical.com> |
| Archive-link: |
| Article, Thread
|
==========================================================================
Ubuntu Security Notice USN-1721-1
February 12, 2013
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
curl could be made to crash or run programs if it opened a malicious URL.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
It was discovered that curl incorrectly handled SASL authentication when
communicating over POP3, SMTP or IMAP. If a user or automated system were
tricked into processing a specially crafted URL, an attacker could cause
a denial of service, or possibly execute arbitrary code. The default
compiler options for affected releases should reduce the vulnerability to a
denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libcurl3 7.27.0-1ubuntu1.1
libcurl3-gnutls 7.27.0-1ubuntu1.1
libcurl3-nss 7.27.0-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1721-1
CVE-2013-0249
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.27.0-1ubuntu1.1
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
(
Log in to post comments)