LWN.net Logo

curl: code execution

Package(s):curl CVE #(s):CVE-2013-0249
Created:February 8, 2013 Updated:February 25, 2013
Description: From the cURL advisory:

libcurl is vulnerable to a buffer overflow vulnerability when communicating with one of the protocols POP3, SMTP or IMAP.

When negotiating SASL DIGEST-MD5 authentication, the function Curl_sasl_create_digest_md5_message() uses the data provided from the server without doing the proper length checks and that data is then appended to a local fixed-size buffer on the stack.

This vulnerability can be exploited by someone who is in control of a server that a libcurl based program is accessing with POP3, SMTP or IMAP. For applications that accept user provided URLs, it is also thinkable that a malicious user would feed an application with a URL to a server hosting code targetting this flaw.

This vulnerability can be used for remote code execution (RCE) on vulnerable systems.

Alerts:
Slackware SSA:2013-038-01 2013-02-07
Ubuntu USN-1721-1 2013-02-12
Fedora FEDORA-2013-2098 2013-02-24

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds