A loop counter error, leading to heap-based buffer overflow flaw was found in the URL decoder of cURL, an utility for retrieval of files from remote servers, used to decode certain strings. Remote attacker could provide a specially-crafted string that when processed by the URL decoder of cURL would lead to curl executable crash or, potentially, arbitrary code execution with the privileges of the user running the curl binary.
This issue affects the versions of the curl package, as shipped with Red Hat Enterprise Linux 5 and 6.
This issue affects the versions of the curl package, as shipped with Fedora release of 17 and 18.
Created attachment 751161 [details]
Proposed upstream patch to correct this issue
Created attachment 751162 [details]
And related upstream test case
released updates for stable Fedora:
Red Hat would like to thank the cURL project for reporting this issue.
Upstream acknowledges Timo Sirainen as the original reporter.
This issue has been addressed in following products:
Red Hat Enterprise Linux 5
Red Hat Enterprise Linux 6
Via RHSA-2013:0983 https://rhn.redhat.com/errata/RHSA-2013-0983.html
Created mingw32-curl tracking bugs for this issue
Affects: epel-5 [bug 978228]
Created mingw-curl tracking bugs for this issue
Affects: fedora-all [bug 978227]
curl-7.29.0-7.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
curl-7.27.0-11.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
curl-7.24.0-10.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
Relevant upstream patch: