(Ubuntu Issues Fix) libcurl Out-of-Bounds Memory Read Error in FTP Wildcard Function Lets Remote Users Redirect the Target Client to an Arbitrary Site
|
SecurityTracker Alert ID: 1039951 |
SecurityTracker URL: http://securitytracker.com/id/1039951
|
CVE Reference:
CVE-2017-8817
(Links to External Site)
|
Date: Dec 4 2017
|
Impact:
Disclosure of system information, Modification of system information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.21.0 - 7.56.1
|
Description:
A vulnerability was reported in libcurl. A remote user may be able to redirect the target client to an arbitrary site.
A remote server can return specially crafted data to trigger an out-of-bounds memory read error in the FTP wildcard matching function (CURLOPT_WILDCARDMATCH) and cause the target connected libcurl client to be redirected.
libcurl applications that use HTTP or HTTPS URLs, allow libcurl redirects, and has FTP wildcards enabled are affected.
The vendor was notified on November 10, 2017.
The OSS-Fuzz project reported reported this vulnerability.
|
Impact:
A remote user may be able to redirect the target client to an arbitrary site.
|
Solution:
Ubuntu has issued a fix.
The Ubuntu advisory is available at:
https://www.ubuntu.com/usn/usn-3498-1
|
Vendor URL: www.ubuntu.com/usn/usn-3498-2 (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Ubuntu)
|
Underlying OS Comments: 12.04 ESM
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|