SB2017100607 - Arch Linux update for lib32-libcurl-gnutls
Published: October 6, 2017
Security Bulletin ID
SB2017100607
Severity
Low
Patch available
YES
Number of vulnerabilities
3
Exploitation vector
Remote access
Highest impact
Information disclosure
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Out-of-bounds read (CVE-ID: CVE-2017-1000099)
The vulnerability allows a local attacker to obtain potentially sensitive information.The weakness exists due to out-of bounds read. A local attacker can load a specially crafted 'file://' URL to cause the curl application to return data from system memory.
Successful exploitation of the vulnerability results in information disclosure.
2) Open redirect (CVE-ID: CVE-2017-1000100)
The vulnerability allows a remote attacker to redirect website visitors to external websites.The weakness exists due to incorrect validation of redirected URL. A remote attacker can redirect the target user's curl request to a TFTP URL with a long filename to cause the target user's curl application to send portions of system memory.
Successful exploitation of the vulnerability results in information disclosure.
3) Out-of-bounds read (CVE-ID: CVE-2017-1000254)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to out-of-bounds read when parsing a directory name when connecting to an FTP server. A remote attacker can trigger memory corruption, access arbitrary files and cause the application to crash.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website.