Bug 137785 - VUL-0: curl: URL parsing code within libcurl is vulnerable to off-by-one buffer overflow
Summary: VUL-0: curl: URL parsing code within libcurl is vulnerable to off-by-one buff...
Status: RESOLVED FIXED
Alias: None
Product: SUSE Linux 10.1
Classification: openSUSE
Component: Other (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Michal Marek
QA Contact: E-mail List
URL:
Whiteboard: CVE-2005-4077: CVSS v2 Base Score: 4....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-12-09 13:08 UTC by Thomas Biege
Modified: 2009-10-13 20:43 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2005-12-09 13:08:07 UTC
Hi,
please have a look at this advisory.

http://www.hardened-php.net/advisory_242005.109.html

CVE-2005-4077
Multiple off-by-one errors in libcurl 7.11.2 through 7.15.0 and earlier allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string
Comment 1 Thomas Biege 2005-12-09 13:15:24 UTC
Maintenance-Tracker-3191
Comment 2 Thomas Biege 2005-12-09 13:15:43 UTC
is compat-curl2 also affected?
Comment 3 Thomas Biege 2005-12-09 13:20:30 UTC
   6 remote non-root user
  +0 human user
  +1 default package
  +1 default active
  -1 user interaction
  -1 DoS

Total Score: 6 (Moderate)
Comment 4 Michal Marek 2005-12-12 11:22:30 UTC
I submitted fixes for 9.2, 9.3 and 10.0. curl <= 7.11.1 (8.1, 9.0, 9.1 and
compat-curl2) isn't affected. I'll update stable to 7.15.1 soon.
Comment 5 Thomas Biege 2005-12-12 11:51:58 UTC
Thanks a lot.

/work/src/done/PATCHINFO/curl.patch.box
Comment 6 Thomas Biege 2006-01-04 09:13:22 UTC
packages approved
Comment 7 Marcus Meissner 2006-03-21 15:44:59 UTC
The CVE entry is wrong I think.

7.11.0 can be tricked into the 2 byte overflow (\0 and 1 other)
7.9.8 can be tricked into the 1 byte (\0) overflow.
Comment 8 Marcus Meissner 2006-03-21 16:02:59 UTC
hmm. still trying to find out
Comment 9 Marcus Meissner 2006-03-21 16:25:43 UTC
I was mistaken.
Comment 10 Thomas Biege 2009-10-13 20:43:20 UTC
CVE-2005-4077: CVSS v2 Base Score: 4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P)