The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] cURL Buffer Overflow (tftp URL)


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 23 Mar 2006 14:24:07 +0200
Subject: [UNIX] cURL Buffer Overflow (tftp URL)
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20060326084725.0883F5803@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru
X-Spam-Status: No, hits=2.057 tagged_above=2 required=5
 tests=DATE_IN_PAST_48_96, MSGID_FROM_MTA_ID
X-Spam-Level: **

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  cURL Buffer Overflow (tftp URL)
------------------------------------------------------------------------


SUMMARY

" <http://curl.haxx.se/>; curl is a command line tool for transferring 
files with URL syntax, supporting FTP, FTPS, TFTP, HTTP, HTTPS, TELNET, 
DICT, FILE and LDAP. curl supports HTTPS certificates, HTTP POST, HTTP 
PUT, FTP uploading, HTTP form based upload, proxies, cookies, 
user+password authentication (Basic, Digest, NTLM, Negotiate, 
kerberos...), file transfer resume, proxy tunneling and a busload of other 
useful tricks."

When cURL fetches a long tftp:// URL with a path that is longer than 512 
characters a buffer overflow may be triggered. The URL must start with 
"tftp://", then a valid hostname, then another slash, and then a path and 
file name with more than 512 characters.

DETAILS

Vulnerable Systems:
 * cURL versions 7.15.0, 7.15.1* and 7.15.2*
* = only on architectures where a certain struct has the same size as on 
the x86 architecture

Immune Systems:
 * cURL versions 7.15.3 or versions patched with this patch : 
<http://curl.haxx.se/libcurl-tftp.patch>; 
http://curl.haxx.se/libcurl-tftp.patch

Successful exploitation of this vulnerability allows attackers to execute 
code within the context of cURL. There are many programs that allow remote 
users to access cURL, for instance through its PHP bindings.

If cURL is configured to follow HTTP redirects, for example by using its 
-L command line option, any web resource can redirect to a tftp:// URL 
that causes this overflow.

Read also cURL's own advisory at:
 <http://curl.haxx.se/docs/adv_20060320.html>; 
http://curl.haxx.se/docs/adv_20060320.html.

Workaround:
If cURL is compiled with "./configure --disable-tftp && make", the whole 
TFTP support in the program is disabled. This secures it effectively 
against this vulnerability, but some users may wish to use the program's 
TFTP capabilities, making it an undesirable workaround for them.

CVE Information:
 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061>; 
CVE-2006-1061.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:metaur@operamail.com.> Ulf 
Harnhammar.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру