what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

debian.curl.txt

debian.curl.txt
Posted Oct 15, 2000
Site debian.org

Debian Security Advisory - The version of curl as distributed with Debian GNU/Linux 2.2 had a bug in the error logging code: when it created an error message it failed to check the size of the buffer allocated for storing the message. This could be exploited by the remote machine by returning an invalid response to a request from curl which overflows the error buffer and trick curl into executing arbitrary code.

tags | remote, overflow, arbitrary
systems | linux, debian
SHA-256 | b4546e53189726ce86a3b698d2a39926c6eabfb3a4c4ab5225418a919e65a44a

debian.curl.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory security@debian.org
https://www.debian.org/security/ Wichert Akkerman
October 14, 2000
- ------------------------------------------------------------------------


Package : curl and curl-ssl
Problem type : remote exploit
Debian-specific: no

The first release of this advisory listed a wrongly compiled curl
package for i386; this has been replaced with version 6.0-1.1.1 .

The version of curl (a tool to retrieve files using ftp, gover or http)
as distributed with Debian GNU/Linux 2.2 had a bug in the error logging
code: when it created an error message it failed to check the size of
the buffer allocated for storing the message. This could be exploited by
the remote machine by returning an invalid response to a request from
curl which overflows the error buffer and trick curl into executing
arbitrary code.

Debian ships with two versions of curl: the normal curl package, and the
crypto-enabled curl-ssl package. This bug has been fixed in curl version
6.0-1.1 and curl-ssl version 6.0-1.2, with the exception being the i386
curl package which has version 6.0-1.1.1 which replaces a wrongly
compiled earlier release as noted above.

We recommend you upgrade your curl or curl-ssl package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

Slink did not contain curl or curl-ssl.

Debian GNU/Linux 2.2 alias potato
- ---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At
this moment packages for m68k are not yet available; they will later be
announce on https://security.debian.org/ .

Fixed curl-ssl packages:

Source archives:
https://security.debian.org/dists/stable/updates/main/source/curl-ssl_6.0-1.2.diff.gz
MD5 checksum: bdfd882127d9f246402be6f9cc8d02d3
https://security.debian.org/dists/stable/updates/main/source/curl-ssl_6.0-1.2.dsc
MD5 checksum: 965a98adeb70df08f5219565c5d2a0cb
https://security.debian.org/dists/stable/updates/main/source/curl-ssl_6.0.orig.tar.gz
MD5 checksum: dffbc34bc3c19d8e8c6a11495aa744fe

Alpha architecture:
https://security.debian.org/dists/stable/updates/main/binary-alpha/curl-ssl_6.0-1.2_alpha.deb
MD5 checksum: 2c8992652534aa6d7e2fc95473a469a7

ARM architecture:
https://security.debian.org/dists/stable/updates/main/binary-arm/curl-ssl_6.0-1.2_arm.deb
MD5 checksum: 168a025e9374b2f96eeae3736bff094f

Intel ia32 architecture:
https://security.debian.org/dists/stable/updates/main/binary-i386/curl-ssl_6.0-1.2_i386.deb
MD5 checksum: 7ad6efee7ec787a450911fbc40111468

PowerPC architecture:
https://security.debian.org/dists/stable/updates/main/binary-powerpc/curl-ssl_6.0-1.2_powerpc.deb
MD5 checksum: 1d62c52cbb711cea17c375978de09e7f

Sun Sparc architecture:
https://security.debian.org/dists/stable/updates/main/binary-sparc/curl-ssl_6.0-1.2_sparc.deb
MD5 checksum: c631f9b4f4789d6ba779d8ebc5ec4867


Fixed curl packages:

Source archives:
https://security.debian.org/dists/stable/updates/main/source/curl_6.0-1.1.diff.gz
MD5 checksum: a95dde95e6a072bd44a8e59b9f3d0e49
https://security.debian.org/dists/stable/updates/main/source/curl_6.0-1.1.dsc
MD5 checksum: d35d95a7e1b8e1d19692d27edecd2155
https://security.debian.org/dists/stable/updates/main/source/curl_6.0.orig.tar.gz
MD5 checksum: dffbc34bc3c19d8e8c6a11495aa744fe

Alpha architecture:
https://security.debian.org/dists/stable/updates/main/binary-alpha/curl_6.0-1.1_alpha.deb
MD5 checksum: dbbe286ceabcd21e398f5bf9566182d0

ARM architecture:
https://security.debian.org/dists/stable/updates/main/binary-arm/curl_6.0-1.1_arm.deb
MD5 checksum: 9fb58f2b273e68b3ba00ebcf53737fa4

Intel ia32 architecture:
https://security.debian.org/dists/stable/updates/main/binary-i386/curl_6.0-1.1.1_i386.deb
MD5 checksum: 5102e282f08bc2c9332762cb1e02df2a

PowerPC architecture:
https://security.debian.org/dists/stable/updates/main/binary-powerpc/curl_6.0-1.1_powerpc.deb
MD5 checksum: d0cb857833f793276bd467773c3e58cf

Sun Sparc architecture:
https://security.debian.org/dists/stable/updates/main/binary-sparc/curl_6.0-1.1_sparc.deb
MD5 checksum: 99f5c19a778e67eec371b316202274c0


These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- --
- ----------------------------------------------------------------------------
apt-get: deb https://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOeeL96jZR/ntlUftAQFs1wL/e1zvjdfgWRtpvHV3uyrQbWxRPeN8SMsi
aPJU5S5FavDSwZGzlVhXANbfblg7aaqTpkM1Xy5RlXGmQ4HYmY5fwwC75AbdR0P2
b5nOUNIX2kM26N6iIIsR7/RH5nYFuCP7
=zQAe
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close