Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55961
Category:Fedora Local Security Checks
Title:Fedora Core 4 FEDORA-2005-1129 (curl)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to curl
announced via advisory FEDORA-2005-1129.

This package fixes a security buffer overflow bug in URL
authentication code of curl (CVE-2005-4077).
* Thu Dec 8 2005 Ivana Varekova 7.13.1-4.fc4
- fix bug 175265 - CVE-2005-4077 SA17907 cURL/libcURL
URL Parsing Off-By-One Vulnerability

* Wed Oct 19 2005 Ivana Varekova 7.13.1-4
- fix bug 170682 - CVE-2005-3185 NTLM buffer overflow
(this change is only in cvs - not build and not create update)

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2005-1129

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-4077
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 15756
http://www.securityfocus.com/bid/15756
BugTraq ID: 17951
http://www.securityfocus.com/bid/17951
Bugtraq: 20051207 Advisory 24/2005: libcurl URL parsing vulnerability (Google Search)
http://www.securityfocus.com/archive/1/418849/100/0/threaded
Cert/CC Advisory: TA06-132A
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
Debian Security Information: DSA-919 (Google Search)
http://www.debian.org/security/2005/dsa-919
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml
http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:224
http://qa.openoffice.org/issues/show_bug.cgi?id=59032
http://www.hardened-php.net/advisory_242005.109.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855
http://www.redhat.com/support/errata/RHSA-2005-875.html
SCO Security Bulletin: SCOSA-2006.16
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt
http://secunia.com/advisories/17907
http://secunia.com/advisories/17960
http://secunia.com/advisories/17961
http://secunia.com/advisories/17965
http://secunia.com/advisories/17977
http://secunia.com/advisories/18105
http://secunia.com/advisories/18188
http://secunia.com/advisories/18336
http://secunia.com/advisories/19261
http://secunia.com/advisories/19433
http://secunia.com/advisories/19457
http://secunia.com/advisories/20077
http://www.trustix.org/errata/2005/0072/
https://usn.ubuntu.com/228-1/
http://www.vupen.com/english/advisories/2005/2791
http://www.vupen.com/english/advisories/2006/0960
http://www.vupen.com/english/advisories/2006/1779
http://www.vupen.com/english/advisories/2008/0924/references
Common Vulnerability Exposure (CVE) ID: CVE-2005-3185
http://docs.info.apple.com/article.html?artnum=302847
BugTraq ID: 15102
http://www.securityfocus.com/bid/15102
BugTraq ID: 15647
http://www.securityfocus.com/bid/15647
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
http://www.mandriva.com/security/advisories?name=MDKSA-2005:182
http://www.osvdb.org/20011
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
http://www.redhat.com/support/errata/RHSA-2005-807.html
http://www.redhat.com/support/errata/RHSA-2005-812.html
SCO Security Bulletin: SCOSA-2006.10
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
http://securitytracker.com/id?1015056
http://securitytracker.com/id?1015057
http://secunia.com/advisories/17192
http://secunia.com/advisories/17193
http://secunia.com/advisories/17203
http://secunia.com/advisories/17208
http://secunia.com/advisories/17228
http://secunia.com/advisories/17247
http://secunia.com/advisories/17297
http://secunia.com/advisories/17320
http://secunia.com/advisories/17400
http://secunia.com/advisories/17403
http://secunia.com/advisories/17485
http://secunia.com/advisories/17813
http://secunia.com/advisories/19193
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
http://securityreason.com/securityalert/82
SuSE Security Announcement: SUSE-SA:2005:063 (Google Search)
http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
https://usn.ubuntu.com/205-1/
http://www.vupen.com/english/advisories/2005/2088
http://www.vupen.com/english/advisories/2005/2125
http://www.vupen.com/english/advisories/2005/2659
XForce ISS Database: wget-curl-ntlm-username-bo(22721)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22721
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.