[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3232-1 curl -- curl

ID: oval:org.secpod.oval:def:602055Date: (C)2015-04-29   (M)2023-12-18
Class: PATCHFamily: unix




Several vulnerabilities were discovered in cURL, an URL transfer library: CVE-2015-3143 NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. This is similar to the issue fixed in DSA-2849-1. CVE-2015-3144 When parsing URLs with a zero-length hostname , libcurl would try to read from an invalid memory address. This could allow remote attackers to cause a denial of service . This issue only affects the upcoming stable and unstable distributions. CVE-2015-3145 When parsing HTTP cookies, if the parsed cookie"s "path" element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service . This issue only affects the upcoming stable and unstable distributions. CVE-2015-3148 When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user.

Platform:
Debian 7.0
Product:
curl
Reference:
DSA-3232-1
CVE-2015-3143
CVE-2015-3144
CVE-2015-3145
CVE-2015-3148
CVE    4
CVE-2015-3145
CVE-2015-3144
CVE-2015-3143
CVE-2015-3148
...
CPE    75
cpe:/a:haxx:curl:7.21.0
cpe:/a:haxx:curl:7.40.0
cpe:/a:haxx:curl:7.21.3
cpe:/a:haxx:curl:7.23.1
...

© SecPod Technologies