Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55804
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2005-310-01)
Summary:The remote host is missing an update for the 'curl/wget' package(s) announced via the SSA:2005-310-01 advisory.
Description:Summary:
The remote host is missing an update for the 'curl/wget' package(s) announced via the SSA:2005-310-01 advisory.

Vulnerability Insight:
New curl packages are available for Slackware 9.1, 10.0, 10.1, 10.2,
and -current, and new wget packages are available for Slackware 8.1,
9.0, 9.1, 10.0, 10.1, 10.2, and -current. These address a buffer
overflow in NTLM handling which may present a security problem, though
no public exploits are known at this time.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[link moved to references]

Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/curl-7.12.2-i486-2.tgz: Patched. This addresses a buffer
overflow in libcurl's NTLM function that could have possible security
implications.
For more details, see:
[links moved to references]
(* Security fix *)
patches/packages/wget-1.10.2-i486-1.tgz: Upgraded to wget-1.10.2.
This addresses a buffer overflow in wget's NTLM handling function that could
have possible security implications.
For more details, see:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'curl/wget' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-3185
http://docs.info.apple.com/article.html?artnum=302847
BugTraq ID: 15102
http://www.securityfocus.com/bid/15102
BugTraq ID: 15647
http://www.securityfocus.com/bid/15647
Debian Security Information: DSA-919 (Google Search)
http://www.debian.org/security/2005/dsa-919
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
http://www.mandriva.com/security/advisories?name=MDKSA-2005:182
http://www.osvdb.org/20011
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
http://www.redhat.com/support/errata/RHSA-2005-807.html
http://www.redhat.com/support/errata/RHSA-2005-812.html
SCO Security Bulletin: SCOSA-2006.10
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
http://securitytracker.com/id?1015056
http://securitytracker.com/id?1015057
http://secunia.com/advisories/17192
http://secunia.com/advisories/17193
http://secunia.com/advisories/17203
http://secunia.com/advisories/17208
http://secunia.com/advisories/17228
http://secunia.com/advisories/17247
http://secunia.com/advisories/17297
http://secunia.com/advisories/17320
http://secunia.com/advisories/17400
http://secunia.com/advisories/17403
http://secunia.com/advisories/17485
http://secunia.com/advisories/17813
http://secunia.com/advisories/17965
http://secunia.com/advisories/19193
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
http://securityreason.com/securityalert/82
SuSE Security Announcement: SUSE-SA:2005:063 (Google Search)
http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
https://usn.ubuntu.com/205-1/
http://www.vupen.com/english/advisories/2005/2088
http://www.vupen.com/english/advisories/2005/2125
http://www.vupen.com/english/advisories/2005/2659
XForce ISS Database: wget-curl-ntlm-username-bo(22721)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22721
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.