(Ubuntu Issues Fix) curl Null Pointer Dereference in LDAP URL Processing Lets Remote Users Cause the Target Application to Crash
|
SecurityTracker Alert ID: 1040980 |
SecurityTracker URL: http://securitytracker.com/id/1040980
|
CVE Reference:
CVE-2018-1000121
(Links to External Site)
|
Date: May 25 2018
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.21.0 - 7.58.0
|
Description:
A vulnerability was reported in curl. A remote user can cause the target application to crash.
A remote server can return a specially crafted redirect to an LDAP URL to trigger a null pointer dereference in ldap_get_attribute_ber() can cause the target application to crash.
Applications that allow LDAP URLs are also affected.
curl versions built to use OpenLDAP are affected.
The vendor was notified on March 6, 2018.
Dario Weisser reported this vulnerability.
|
Impact:
A remote server can cause the target application to crash.
|
Solution:
Ubuntu has issued a fix.
The Ubuntu advisory is available at:
https://usn.ubuntu.com/usn/usn-3598-2
|
Vendor URL: usn.ubuntu.com/usn/usn-3598-2 (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Ubuntu)
|
Underlying OS Comments: 12.04 ESM
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|