Bug 965640 (CVE-2013-2174)

Summary: CVE-2013-2174 curl: Loop counter error, leading to heap-based buffer overflow when decoding certain URLs
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jrusnack, kdudka, ksrot, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=moderate,public=20130622,reported=20130521,source=upstream,cvss2=6.8/AV:N/AC:M/Au:N/C:P/I:P/A:P,rhel-5/curl=affected,rhel-6/curl=affected,fedora-all/curl=affected,fedora-all/mingw-curl=affected,epel-5/mingw32-curl=affected,cwe=CWE-122[auto]
Fixed In Version: curl 7.31.0 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-10-01 03:08:25 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 973940, 973941, 973943, 973944, 978227, 978228    
Bug Blocks: 965650    
Attachments:
Description Flags
Proposed upstream patch to correct this issue
none
And related upstream test case
none
test-case none

Description Jan Lieskovsky 2013-05-21 09:03:37 EDT
A loop counter error, leading to heap-based buffer overflow flaw was found in the URL decoder of cURL, an utility for retrieval of files from remote servers, used to decode certain strings. Remote attacker could provide a specially-crafted string that when processed by the URL decoder of cURL would lead to curl executable crash or, potentially, arbitrary code execution with the privileges of the user running the curl binary.

Advisory: http://curl.haxx.se/docs/adv_20130622.html
Patch: http://curl.haxx.se/libcurl-unescape.patch
Comment 1 Jan Lieskovsky 2013-05-21 09:08:44 EDT
This issue affects the versions of the curl package, as shipped with Red Hat Enterprise Linux 5 and 6.

--

This issue affects the versions of the curl package, as shipped with Fedora release of 17 and 18.
Comment 2 Jan Lieskovsky 2013-05-21 09:09:38 EDT
Created attachment 751161 [details]
Proposed upstream patch to correct this issue
Comment 3 Jan Lieskovsky 2013-05-21 09:10:20 EDT
Created attachment 751162 [details]
And related upstream test case
Comment 14 Murray McAllister 2013-06-25 04:22:02 EDT
Acknowledgements:

Red Hat would like to thank the cURL project for reporting this issue.
Upstream acknowledges Timo Sirainen as the original reporter.
Comment 15 errata-xmlrpc 2013-06-25 15:21:31 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:0983 https://rhn.redhat.com/errata/RHSA-2013-0983.html
Comment 16 Huzaifa S. Sidhpurwala 2013-06-26 02:50:05 EDT
Created mingw32-curl tracking bugs for this issue

Affects: epel-5 [bug 978228]
Comment 17 Huzaifa S. Sidhpurwala 2013-06-26 02:50:19 EDT
Created mingw-curl tracking bugs for this issue

Affects: fedora-all [bug 978227]
Comment 18 Fedora Update System 2013-06-29 14:43:53 EDT
curl-7.29.0-7.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 19 Fedora Update System 2013-07-11 23:15:00 EDT
curl-7.27.0-11.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 20 Fedora Update System 2013-07-22 21:11:09 EDT
curl-7.24.0-10.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 21 Jan Lieskovsky 2013-07-31 09:02:47 EDT
Relevant upstream patch:
  https://github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737