Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1495541 - (CVE-2017-1000254) CVE-2017-1000254 curl: FTP PWD response parser out of bounds read
CVE-2017-1000254 curl: FTP PWD response parser out of bounds read
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171004,repor...
: Security
Depends On: 1498395 1498397 1498396
Blocks: 1495542
  Show dependency treegraph
 
Reported: 2017-09-26 05:31 EDT by Andrej Nemec
Modified: 2018-08-16 12:09 EDT (History)
28 users (show)

See Also:
Fixed In Version: curl 7.56.0
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:2486 None None None 2018-08-16 12:09 EDT

  None (edit)
Description Andrej Nemec 2017-09-26 05:31:46 EDT
When libcurl connects to an FTP server and successfully logs in (anonymous or
not), it asks the server for the current directory with the `PWD` command. The
server then responds with a 257 response containing the path, inside double
quotes. The returned path name is then kept by libcurl for subsequent uses.

Due to a flaw in the string parser for this directory name, a directory name
passed like this but without a closing double quote would lead to libcurl not
adding a trailing NUL byte to the buffer holding the name. When libcurl would
then later access the string, it could read beyond the allocated heap buffer
and crash or wrongly access data beyond the buffer, thinking it was part of
the path.

A malicious server could abuse this fact and effectively prevent libcurl-based
clients to work with it - the PWD command is always issued on new FTP
connections and the mistake has a high chance of causing a segfault.

Introduced with:

https://github.com/curl/curl/commit/415d2e7cb7

External References:

https://curl.haxx.se/docs/adv_20171004.html
Comment 1 Andrej Nemec 2017-09-26 05:31:59 EDT
Acknowledgments:

Name: Daniel Stenberg
Upstream: Max Dymond
Comment 3 Andrej Nemec 2017-10-04 04:41:54 EDT
Created curl tracking bugs for this issue:

Affects: fedora-all [bug 1498396]


Created mingw-curl tracking bugs for this issue:

Affects: epel-7 [bug 1498397]
Affects: fedora-all [bug 1498395]
Comment 5 errata-xmlrpc 2018-08-16 12:09:06 EDT
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:2486

Note You need to log in before you can comment on or make changes to this bug.