Tuesday, February 12, 2013

[USN-1721-1] curl vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQIcBAEBCgAGBQJRGqi9AAoJEGVp2FWnRL6TwLAP/0Shltgw3W6j3dc64k8kAq+r
behHJDnUjBFRxtP5FOtVeqDeBLKuuDNrb1scZM+1+QLS/NdX6neFgqsiUKDrSjGP
+5shXtBbvyeYzsvIV9RBtJPQMPWGesjPdmzdocZgoxSxY30aD0t5uVbxSYO7xSSf
+rhl2QF1+OCd0BCykebLEGK21gyDCAjoGFuF2+QBsVtXr6Zu820+sI95ruvKeqGG
jBnij8Z06SzdcNfSKLqLp/bZWUdMXQ+wsc9EjASVd+3LRTwO4w7YD01A0VT8Pnri
wUNf8xr61v6tXR95frpbwFHktbg00h9IdPiztVo3iOi1Lqehv0lI05UV8N94EnZa
xxreno53VaV0+lkJ6qLX49g7ZTEhwNFVrsNiZRTYBgSXsMMrpnR8Bm4X+Tv0ZaQk
TVop426Z7piw8/3XlGvHGvpcgf1JKlSwcGhlHOQCW8X6uGj0YaSEsJXALvOdYZmP
MeOp+ornAkgTHnI3lp/iYKcbkvCV1aCN1KOULSmyflH5aauw8/65QAKgUW4UuNe7
n9xU8eyhWIEOW05Kk3fXddJFOBywjpGy7v9R0zGmVQ8192wx9yrPHf0U9FpUOmWV
Q2SiU2zmDqcA6/eGPHo+u24nFZgS72jX9D4C/2Eqd64ecv3X/ARIx3Dpzjkxyn8O
jcKvWo5G+pUzdB5m8VNR
=Dgks
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1721-1
February 12, 2013

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10

Summary:

curl could be made to crash or run programs if it opened a malicious URL.

Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries

Details:

It was discovered that curl incorrectly handled SASL authentication when
communicating over POP3, SMTP or IMAP. If a user or automated system were
tricked into processing a specially crafted URL, an attacker could cause
a denial of service, or possibly execute arbitrary code. The default
compiler options for affected releases should reduce the vulnerability to a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
libcurl3 7.27.0-1ubuntu1.1
libcurl3-gnutls 7.27.0-1ubuntu1.1
libcurl3-nss 7.27.0-1ubuntu1.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1721-1
CVE-2013-0249

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.27.0-1ubuntu1.1

No comments:

Post a Comment