You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa curl

Sigurnosni nedostatak programskog paketa curl

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3457-1
October 23, 2017

curl vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

curl could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Brian Carpenter discovered that curl incorrectly handled IMAP FETCH
response lines. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
curl 7.55.1-1ubuntu2.1
libcurl3 7.55.1-1ubuntu2.1
libcurl3-gnutls 7.55.1-1ubuntu2.1
libcurl3-nss 7.55.1-1ubuntu2.1

Ubuntu 17.04:
curl 7.52.1-4ubuntu1.3
libcurl3 7.52.1-4ubuntu1.3
libcurl3-gnutls 7.52.1-4ubuntu1.3
libcurl3-nss 7.52.1-4ubuntu1.3

Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.4
libcurl3 7.47.0-1ubuntu2.4
libcurl3-gnutls 7.47.0-1ubuntu2.4
libcurl3-nss 7.47.0-1ubuntu2.4

Ubuntu 14.04 LTS:
curl 7.35.0-1ubuntu2.12
libcurl3 7.35.0-1ubuntu2.12
libcurl3-gnutls 7.35.0-1ubuntu2.12
libcurl3-nss 7.35.0-1ubuntu2.12

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3457-1
CVE-2017-1000257

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.55.1-1ubuntu2.1
https://launchpad.net/ubuntu/+source/curl/7.52.1-4ubuntu1.3
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.4
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.12

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=25D1
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-10-0016-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci WPA protokola

Otkriveno je deset ranjivosti kod Wi-Fi Protected Access (WPA) i Wi-Fi Protected Access II (WPA2) protokola od kojih jedna utječe...

Close