SB2017100702 - Debian update for curl



SB2017100702 - Debian update for curl

Published: October 7, 2017

Security Bulletin ID SB2017100702
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Open redirect (CVE-ID: CVE-2017-1000100)

The vulnerability allows a remote attacker to redirect website visitors to external websites.

The weakness exists due to incorrect validation of redirected URL. A remote attacker can redirect the target user's curl request to a TFTP URL with a long filename to cause the target user's curl application to send portions of system memory.

Successful exploitation of the vulnerability results in information disclosure.

2) Out-of-bounds read (CVE-ID: CVE-2017-1000101)

The vulnerability allows a remote attacker to redirect website visitors to external websites.

The weakness exists due to out-of-bounds read. A local user can supply a URL containing specially crafted numerical range characters to trigger a heap read error and obtain potentially sensitive information from system memory

Successful exploitation of the vulnerability results in information disclosure.

3) Out-of-bounds read (CVE-ID: CVE-2017-1000254)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to out-of-bounds read when parsing a directory name when connecting to an FTP server. A remote attacker can trigger memory corruption, access arbitrary files and cause the application to crash.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.