Nessus Plugin #17345

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200503-20] curl: NTLM response buffer overflow

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2005 Michel Arboi
Summary:
curl: NTLM response buffer overflow
Version:
$Revision: 1.1 $
Cve_id:
CAN-2005-0490
Bugtraq_id:
-
Xrefs:
GLSA:200503-20
Description:
The remote host is affected by the vulnerability described in GLSA-200503-20
(curl: NTLM response buffer overflow)


curl fails to properly check boundaries when handling NTLM
authentication.

Impact

With a malicious server an attacker could send a carefully crafted
NTLM response to a connecting client leading to the execution of
arbitrary code with the permissions of the user running curl.

Workaround

Disable NTLM authentication by not using the --anyauth or --ntlm
options.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490


Solution:
All curl users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1"


Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.