Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.13.2013.038.01
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2013-038-01)
Summary:The remote host is missing an update for the 'curl' package(s) announced via the SSA:2013-038-01 advisory.
Description:Summary:
The remote host is missing an update for the 'curl' package(s) announced via the SSA:2013-038-01 advisory.

Vulnerability Insight:
New curl packages are available for Slackware 14.0, and -current to
fix a security issue.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/curl-7.29.0-i486-1_slack14.0.txz: Upgraded.
When negotiating SASL DIGEST-MD5 authentication, the function
Curl_sasl_create_digest_md5_message() uses the data provided from the
server without doing the proper length checks and that data is then
appended to a local fixed-size buffer on the stack. This vulnerability
can be exploited by someone who is in control of a server that a libcurl
based program is accessing with POP3, SMTP or IMAP. For applications
that accept user provided URLs, it is also thinkable that a malicious
user would feed an application with a URL to a server hosting code
targeting this flaw.
Affected versions: curl 7.26.0 to and including 7.28.1
For more information, see:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'curl' package(s) on Slackware 14.0, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-0249
1028093
http://www.securitytracker.com/id/1028093
24487
http://www.exploit-db.com/exploits/24487
57842
http://www.securityfocus.com/bid/57842
89988
http://www.osvdb.org/89988
APPLE-SA-2013-10-22-3
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
FEDORA-2013-2098
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html
USN-1721-1
http://www.ubuntu.com/usn/USN-1721-1
http://blog.volema.com/curl-rce.html
http://curl.haxx.se/docs/adv_20130206.html
http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/
http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html
http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.