Bug 906779 (CVE-2013-0249)

Summary: CVE-2013-0249 curl: Stack-based buffer overflow when negotiating SASL DIGEST-MD5 authentication with IMAP, POP3 and SMTP protocols
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jrusnack, rcvalle, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-02-25 08:35:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 908301    
Bug Blocks: 906789    
Attachments:
Description Flags
Proposed upstream patch to correct this issue none

Description Jan Lieskovsky 2013-02-01 13:29:04 UTC
A stack-based buffer overflow flaw was found in the way SASL implementation of cURL, a command line tool for transferring data with URL syntax, performed DIGEST-MD5 authentication negotiation for IMAP, POP3, and SMTP protocols. A rogue server could use this flaw to cause curl executable / application using the libcurl library it to crash or, potentially, execute arbitrary code with the privileges of the user running the curl binary / the application.

Comment 2 Jan Lieskovsky 2013-02-01 13:34:32 UTC
Created attachment 691585 [details]
Proposed upstream patch to correct this issue

Comment 3 Jan Lieskovsky 2013-02-01 13:36:16 UTC
This issue did not affect the versions of the curl package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue did not affect the versions of the curl package, as shipped with Fedora release of 16 and 17.

--

This issue affects the version of the curl package, as shipped with Fedora release of 18.

Comment 4 Jan Lieskovsky 2013-02-01 13:37:19 UTC
cURL upstream proposes next Wednesday, February the 6-th, 2013, as the embargo date for this issue.

Comment 5 Jan Lieskovsky 2013-02-01 13:40:32 UTC
Acknowledgements:

Red Hat would like to that Daniel Stenberg of cURL project for reporting of this issue. Upstream acknowledges researcher known as Volema as the original issue reporter.

Comment 6 Jan Lieskovsky 2013-02-01 13:43:47 UTC
Statement:

Not vulnerable. This issue did not affect the versions of curl as shipped with Red Hat Enterprise Linux 5 and 6.

Comment 7 Jan Lieskovsky 2013-02-06 11:27:54 UTC
External References:

http://curl.haxx.se/docs/adv_20130206.html

Comment 8 Jan Lieskovsky 2013-02-06 11:29:26 UTC
Created curl tracking bugs for this issue

Affects: fedora-18 [bug 908301]

Comment 9 Tomas Hoger 2013-02-08 09:09:37 UTC
Write up form the reporter of the issue, along with proof-of-concept code:

http://blog.volema.com/curl-rce.html

Comment 10 Fedora Update System 2013-02-24 08:27:05 UTC
curl-7.27.0-6.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.