LWN.net Logo

Ubuntu alert USN-1721-1 (curl)

From:  Marc Deslauriers <marc.deslauriers@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-1721-1] curl vulnerability
Date:  Tue, 12 Feb 2013 15:40:29 -0500
Message-ID:  <511AA8BD.1000607@canonical.com>
Archive-link:  Article, Thread

========================================================================== Ubuntu Security Notice USN-1721-1 February 12, 2013 curl vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.10 Summary: curl could be made to crash or run programs if it opened a malicious URL. Software Description: - curl: HTTP, HTTPS, and FTP client and client libraries Details: It was discovered that curl incorrectly handled SASL authentication when communicating over POP3, SMTP or IMAP. If a user or automated system were tricked into processing a specially crafted URL, an attacker could cause a denial of service, or possibly execute arbitrary code. The default compiler options for affected releases should reduce the vulnerability to a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.10: libcurl3 7.27.0-1ubuntu1.1 libcurl3-gnutls 7.27.0-1ubuntu1.1 libcurl3-nss 7.27.0-1ubuntu1.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1721-1 CVE-2013-0249 Package Information: https://launchpad.net/ubuntu/+source/curl/7.27.0-1ubuntu1.1 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds