You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa curl

Sigurnosni nedostaci programskog paketa curl

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3648-1
May 16, 2018

curl vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in curl.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

Dario Weisser discovered that curl incorrectly handled long FTP server
command replies. If a user or automated system were tricked into connecting
to a malicious FTP server, a remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affected Ubuntu 17.10 and Ubuntu 18.04 LTS.
(CVE-2018-1000300)

Max Dymond discovered that curl incorrectly handled certain RTSP responses.
If a user or automated system were tricked into connecting to a malicious
server, a remote attacker could use this issue to cause curl to crash,
resulting in a denial of service, or possibly obtain sensitive information.
(CVE-2018-1000301)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
curl 7.58.0-2ubuntu3.1
libcurl3-gnutls 7.58.0-2ubuntu3.1
libcurl3-nss 7.58.0-2ubuntu3.1
libcurl4 7.58.0-2ubuntu3.1

Ubuntu 17.10:
curl 7.55.1-1ubuntu2.5
libcurl3 7.55.1-1ubuntu2.5
libcurl3-gnutls 7.55.1-1ubuntu2.5
libcurl3-nss 7.55.1-1ubuntu2.5

Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.8
libcurl3 7.47.0-1ubuntu2.8
libcurl3-gnutls 7.47.0-1ubuntu2.8
libcurl3-nss 7.47.0-1ubuntu2.8

Ubuntu 14.04 LTS:
curl 7.35.0-1ubuntu2.16
libcurl3 7.35.0-1ubuntu2.16
libcurl3-gnutls 7.35.0-1ubuntu2.16
libcurl3-nss 7.35.0-1ubuntu2.16

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3648-1
CVE-2018-1000300, CVE-2018-1000301, CVE-2018-1000303

Package Information:
https://launchpad.net/ubuntu/+source/curl/7.58.0-2ubuntu3.1
https://launchpad.net/ubuntu/+source/curl/7.55.1-1ubuntu2.5
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.8
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.16

—–BEGIN PGP SIGNATURE—–
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=XZwr
—–END PGP SIGNATURE—–

AutorPetar Bertok
Cert idNCERT-REF-2018-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top