Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702660
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2660-1 (curl - exposure of sensitive information)
Summary:Yamada Yasuharu discovered that cURL, an URL transfer library, is;vulnerable to expose potentially sensitive information when doing;requests across domains with matching tails. Due to a bug in the;tailmatch function when matching domain names, it was possible that;cookies set for a domain ample.com could accidentally also be sent;by libcurl when communicating with example.com;.;;Both curl the command line tool and applications using the libcurl;library are vulnerable.
Description:Summary:
Yamada Yasuharu discovered that cURL, an URL transfer library, is
vulnerable to expose potentially sensitive information when doing
requests across domains with matching tails. Due to a bug in the
tailmatch function when matching domain names, it was possible that
cookies set for a domain ample.com could accidentally also be sent
by libcurl when communicating with example.com
.

Both curl the command line tool and applications using the libcurl
library are vulnerable.

Affected Software/OS:
curl on Debian Linux

Solution:
For the stable distribution (squeeze), this problem has been fixed in
version 7.21.0-2.1+squeeze3.

For the testing distribution (wheezy), this problem has been fixed in
version 7.26.0-1+wheezy2.

For the unstable distribution (sid), this problem has been fixed in
version 7.29.0-2.1.

We recommend that you upgrade your curl packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-1944
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
BugTraq ID: 59058
http://www.securityfocus.com/bid/59058
Debian Security Information: DSA-2660 (Google Search)
http://www.debian.org/security/2012/dsa-2660
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:151
https://bugzilla.redhat.com/show_bug.cgi?id=950577
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121
http://www.osvdb.org/92316
RedHat Security Advisories: RHSA-2013:0771
http://rhn.redhat.com/errata/RHSA-2013-0771.html
http://secunia.com/advisories/53044
http://secunia.com/advisories/53051
http://secunia.com/advisories/53097
SuSE Security Announcement: openSUSE-SU-2013:0876 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html
SuSE Security Announcement: openSUSE-SU-2013:0879 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html
http://www.ubuntu.com/usn/USN-1801-1
CopyrightCopyright (C) 2013 Greenbone Networks GmbH http://greenbone.net

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.