SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   curl Vendors:   curl.haxx.se
libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1032232
SecurityTracker URL:  http://securitytracker.com/id/1032232
CVE Reference:   CVE-2015-3143, CVE-2015-3144, CVE-2015-3145, CVE-2015-3148   (Links to External Site)
Date:  May 4 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.37.0 - 7.41.0
Description:   Multiple vulnerabilities were reported in cURL. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions on the target system. A remote user can obtain potentially sensitive information on the target system.

When the system authenticates to a host using NTLM HTTP authentication, the system may re-use the NTLM HTTP credentials when later connecting to the same host via HTTP [CVE-2015-3143]. Paras Sethia reported this vulnerability.

A remote or local user can supply a specially crafted zero-length hostname to the application using libcurl to trigger a crash or code execution [CVE-2015-3144]. Hanno Bock reported this vulnerability.

A remote user local user can supply a specially crafted cookie value to the application using libcurl to trigger a crash or code execution [CVE-2015-3145]. Hanno Bock reported this vulnerability.

When 'Negotiate' authenticated connections are used, libcur may authenticate the entire connection rather than specific HTTP requests [CVE-2015-3148]. Isaac Boukris reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

Solution:   The vendor has issued a fix (7.42.0).

The vendor's advisories are available at:

http://curl.haxx.se/docs/adv_20150422A.html
http://curl.haxx.se/docs/adv_20150422B.html
http://curl.haxx.se/docs/adv_20150422C.html
http://curl.haxx.se/docs/adv_20150422D.html

Vendor URL:  curl.haxx.se/docs/adv_20150422A.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 4 2015 (Ubuntu Issues Fix) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
Ubuntu has issued a fix for Ubuntu 12.04 LTS, 14.04 LTS, 14.10, and 15.04.
Jul 23 2015 (Red Hat Issues Fix) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Jul 29 2015 (Oracle Issues Fix for Oracle Linux) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
Oracle has issued a fix for Oracle Linux 6.
Oct 8 2015 (IBM Issues Fix for IBM Tivoli Composite Application Manager) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
IBM has issued a fix for IBM Tivoli Composite Application Manager.
Oct 8 2015 (IBM Issues Fix for IBM Tivoli Netcool System Service Monitor) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
IBM has issued a fix for IBM Tivoli Netcool System Service Monitor.
Oct 21 2015 (Oracle Issues Fix for MySQL) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
Oracle has issued a fix for MySQL.
Oct 27 2015 (IBM Issues Fix for IBM Security Network Protection) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
IBM has issued a fix for IBM Security Network Protection.
Nov 20 2015 (Red Hat Issues Fix) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
Red Hat has issued a fix for Red Hat Enterprise Linux 7.
Feb 22 2016 (HPE Issues Fix for HPE Intelligent Management Center Plat) libcurl Bugs Let Remote Users Deny Service and Execute Arbitrary Code
HPE has issued a fix for HPE Intelligent Management Center (iMC) Plat and Comware products.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC