|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for curl RHSA-2017:2016-01|
|Summary:||The remote host is missing an update for the 'curl'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'curl'
package(s) announced via the referenced advisory.
The curl packages provide the libcurl
library and the curl utility for downloading files from servers using various
protocols, including HTTP, FTP, and LDAP. Security Fix(es): * Multiple integer
overflow flaws leading to heap-based buffer overflows were found in the way curl
handled escaping and unescaping of data. An attacker could potentially use these
flaws to crash an application using libcurl by sending a specially crafted input
to the affected libcurl functions. (CVE-2016-7167) Additional Changes: For
detailed information on changes in this release, see the Red Hat Enterprise
Linux 7.4 Release Notes linked from the References section.
curl on Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2016-7167|
BugTraq ID: 92975
RedHat Security Advisories: RHSA-2017:2016
RedHat Security Advisories: RHSA-2018:2486
RedHat Security Advisories: RHSA-2018:3558
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.