[USN-1721-1] curl vulnerability
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Feb 12 20:40:29 UTC 2013
==========================================================================
Ubuntu Security Notice USN-1721-1
February 12, 2013
curl vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
Summary:
curl could be made to crash or run programs if it opened a malicious URL.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
It was discovered that curl incorrectly handled SASL authentication when
communicating over POP3, SMTP or IMAP. If a user or automated system were
tricked into processing a specially crafted URL, an attacker could cause
a denial of service, or possibly execute arbitrary code. The default
compiler options for affected releases should reduce the vulnerability to a
denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libcurl3 7.27.0-1ubuntu1.1
libcurl3-gnutls 7.27.0-1ubuntu1.1
libcurl3-nss 7.27.0-1ubuntu1.1
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1721-1
CVE-2013-0249
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.27.0-1ubuntu1.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 899 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20130212/67043490/attachment.sig>
More information about the ubuntu-security-announce
mailing list