(Ubuntu Issues Fix) cURL Buffer Overread in Processing IMAP FETCH Response Data Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
|
SecurityTracker Alert ID: 1039649 |
SecurityTracker URL: http://securitytracker.com/id/1039649
|
CVE Reference:
CVE-2017-1000257
(Links to External Site)
|
Date: Oct 24 2017
|
Impact:
Denial of service via network, Disclosure of system information, Disclosure of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.20.0 - 7.56.0
|
Description:
A vulnerability was reported in cURL. A remote user can cause the target application to crash. A remote user can obtain potentially sensitive information on the target system.
A remote user can return a specially crafted IMAP FETCH response to trigger a buffer overread in the IMAP handler and obtain potentially sensitive information from memory on the target system or cause the target application using libcurl to crash.
Brian Carpenter, Geeknik Labs, and 0xd34db347 reported this vulnerability.
|
Impact:
A remote user can cause the target application using libcurl to crash.
A remote user can obtain potentially sensitive information on the target system.
|
Solution:
Ubuntu has issued a fix.
The Ubuntu advisory is available at:
https://www.ubuntu.com/usn/usn-3441-1
|
Vendor URL: www.ubuntu.com/usn/usn-3441-2 (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Ubuntu)
|
Underlying OS Comments: 12.04 ESM
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|