English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 148472 CVE descriptions
and 72306 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2005-42
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date: 12 Apr 2005
 Last revised: 12 Apr 2005

 Package: curl

 Summary: Buffer overflow vulnerabilities exist in curl

 More information:
    Curl is a client to get documents/files from servers, using any of the
    supported protocols. The command is designed to work without user
    interaction or any kind of interactivity.

    The buffer overflow vulnerabilities exist in libcurl's NTLM authorization base64 decoding. 

 Impact:
    This vulnerability allow a remote attacker using a prepared remote server
    to execute arbitrary code as the user running curl.

 Affected Products:
    - Turbolinux Appliance Server 1.0 Hosting Edition
    - Turbolinux Appliance Server 1.0 Workgroup Edition
    - Turbolinux 10 Server
    - Turbolinux Home
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop

 Solution:
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Server, Turbolinux 10 Desktop, Turbolinux 10 F..., 
  Turbolinux Home]
 # turbopkg
 or
 # zabom -u curl curl-devel
 ---------------------------------------------


 <Turbolinux Appliance Server 1.0 Hosting Edition>

   Source Packages
   Size: MD5

   curl-7.10.6-5.src.rpm
       988987 9a28b8ab79e63e7d4168fbf99c745a53

   Binary Packages
   Size: MD5

   curl-7.10.6-5.i586.rpm
       233017 53f7959554e78d2a1908a6aae07db386

 <Turbolinux Appliance Server 1.0 Workgroup Edition>

   Source Packages
   Size: MD5

   curl-7.10.6-5.src.rpm
       988987 abdb83d9b781b891260b900371bfc500

   Binary Packages
   Size: MD5

   curl-7.10.6-5.i586.rpm
       233181 b5d9e4c839c4e70835a851446347fe47
   curl-devel-7.10.6-5.i586.rpm
       174242 e9770f4ddc7ffb53b2cb77ec6f29ea13

 <Turbolinux 10 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/SRPMS/curl-7.10.6-5.src.rpm
       988987 fbf5c8621e10b8cba8a0dfdd67fdadaf

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/curl-7.10.6-5.i586.rpm
       309143 1b62ed1831b14ea5e4f741d33251fa5a
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/curl-debug-7.10.6-5.i586.rpm
       626505 23351ec20b1c1db84c9e0b70bb3d53d6
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/updates/RPMS/curl-devel-7.10.6-5.i586.rpm
       175746 9ab9529669357fd95459d7184203522a

 <Turbolinux 10 Desktop, Turbolinux 10 F..., Turbolinux Home>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/curl-7.10.6-5.src.rpm
       988987 baa3bb3eca4374ac66c7943445c88957

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/curl-7.10.6-5.i586.rpm
       308473 f18cabeffdad5e7d4bb4eff14f10991a
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/curl-devel-7.10.6-5.i586.rpm
       175752 13f3d814294bd769bcf463a1b601487b


 References:

 CVE
   [CAN-2005-0490]
   CAN-2005-0490">http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490

 --------------------------------------------------------------------------
 Revision History
    12 Apr 2005 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2005 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.7 (GNU/Linux)

iD8DBQFCW0x+K0LzjOqIJMwRAk6DAJ4iAT/LvyJaHH6l6pZkH+s1vB8hxACfYcCM
p2/FFWlqoLAydSkIyNxOuMM=
=39Qe
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.