diff options
author | Vasil Dimov <vd@FreeBSD.org> | 2006-03-20 12:58:15 +0000 |
---|---|---|
committer | Vasil Dimov <vd@FreeBSD.org> | 2006-03-20 12:58:15 +0000 |
commit | 4ff24336d9bb91cad96c462f99b62d36052a3d09 (patch) | |
tree | b0a2271be5577d251e015e4f3cf9cbac74d203f1 /security | |
parent | a612d79c9102b0eec3cb73e194fc8ddf60f2e703 (diff) | |
download | ports-4ff24336d9bb91cad96c462f99b62d36052a3d09.tar.gz ports-4ff24336d9bb91cad96c462f99b62d36052a3d09.zip |
Document ftp/curl's TFTP packet buffer overflow vulnerability
Reworked by: simon
Approved by: security-officer (simon)
Notes
Notes:
svn path=/head/; revision=157733
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 645a548ff6d6..fe2b0a2335fd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,41 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="b8e361b8-b7ff-11da-8414-0013d4a4a40e"> + <topic>curl -- TFTP packet buffer overflow vulnerability</topic> + <affects> + <package> + <name>curl</name> + <range><ge>7.15.0</ge><lt>7.15.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A Project cURL Security Advisory reports:</p> + <blockquote cite="http://curl.haxx.se/docs/adv_20060320.html"> + <p>libcurl uses the given file part of a TFTP URL in a manner that allows a + malicious user to overflow a heap-based memory buffer due to the lack of + boundary check.</p> + <p>This overflow happens if you pass in a URL with a TFTP + protocol prefix ("tftp://"), using a valid host and a path + part that is longer than 512 bytes.</p> + <p>The affected flaw can be triggered by a redirect, if + curl/libcurl is told to follow redirects and an HTTP + server points the client to a tftp URL with the + characteristics described above.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2006-1061</cvename> + <url>http://curl.haxx.se/docs/adv_20060320.html</url> + </references> + <dates> + <discovery>2006-03-20</discovery> + <entry>2006-03-20</entry> + </dates> + </vuln> + <vuln vid="6779e82f-b60b-11da-913d-000ae42e9b93"> <topic>drupal -- multiple vulnerabilities</topic> <affects> |