Bug 175191

Summary: CVE-2005-4077 SA17907 cURL/libcURL URL Parsing Off-By-One Vulnerability
Product: [Fedora] Fedora Reporter: Ignacio Vazquez-Abrams <ivazqueznet>
Component: curlAssignee: Ivana Varekova <varekova>
Status: CLOSED RAWHIDE QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: rawhideKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://secunia.com/advisories/17907/
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-12-08 09:31:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Ignacio Vazquez-Abrams 2005-12-07 15:47:47 UTC
'Stefan Esser has reported a vulnerability in cURL/libcURL, which has an unknown
impact.'

'The vulnerability is caused due to an off-by-one error when parsing an URL that
is longer than 256 bytes. By using a specially crafted URL, a two-byte overflow
is reportedly possible. This may be exploited to corrupt memory allocation
structures. The vulnerability is reportedly exploitable only via a direct
request to cURL and not via a redirect.'

'The vulnerability has been reported in version 7.15.0 and prior.'

Comment 1 Ivana Varekova 2005-12-08 09:31:17 UTC
Thank you for your bug report. 
There is the latest upstream version curl-7.15.1-1 in the devel branch now which
is fixes this problem.