|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: curl: URL parsing code within libcurl is vulnerable to off-by-one buffer overflow | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE Linux 10.1 | Reporter: | Thomas Biege <thomas> |
| Component: | Other | Assignee: | Michal Marek <mmarek> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | patch-request, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | CVE-2005-4077: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Thomas Biege
2005-12-09 13:08:07 UTC
Maintenance-Tracker-3191 is compat-curl2 also affected? 6 remote non-root user +0 human user +1 default package +1 default active -1 user interaction -1 DoS Total Score: 6 (Moderate) I submitted fixes for 9.2, 9.3 and 10.0. curl <= 7.11.1 (8.1, 9.0, 9.1 and compat-curl2) isn't affected. I'll update stable to 7.15.1 soon. Thanks a lot. /work/src/done/PATCHINFO/curl.patch.box packages approved The CVE entry is wrong I think. 7.11.0 can be tricked into the 2 byte overflow (\0 and 1 other) 7.9.8 can be tricked into the 1 byte (\0) overflow. hmm. still trying to find out I was mistaken. CVE-2005-4077: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) |