Mehrere Probleme in curl
ID: | USN-2591-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10, Ubuntu 15.04 |
Datum: | Do, 30. April 2015, 22:53 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153 |
Applikationen: | curl |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2299290769831821718== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="LnuimdXJXNvhuXMl7f1ox2W7VEXoiEU6q" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --LnuimdXJXNvhuXMl7f1ox2W7VEXoiEU6q Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2591-1 April 30, 2015 curl vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: Several security issues were fixed in curl. Software Description: - curl: HTTP, HTTPS, and FTP client and client libraries Details: Paras Sethia discovered that curl could incorrectly re-use NTLM HTTP credentials when subsequently connecting to the same host over HTTP. (CVE-2015-3143) Hanno Böck discovered that curl incorrectly handled zero-length host names. If a user or automated system were tricked into using a specially crafted host name, an attacker could possibly use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-3144) Hanno Böck discovered that curl incorrectly handled cookie path elements. If a user or automated system were tricked into parsing a specially crafted cookie, an attacker could possibly use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-3145) Isaac Boukris discovered that when using Negotiate authenticated connections, curl could incorrectly authenticate the entire connection and not just specific HTTP requests. (CVE-2015-3148) Yehezkel Horowitz and Oren Souroujon discovered that curl sent HTTP headers both to servers and proxies by default, contrary to expectations. This issue only affected Ubuntu 14.10 and Ubuntu 15.04. (CVE-2015-3153) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: libcurl3 7.38.0-3ubuntu2.2 libcurl3-gnutls 7.38.0-3ubuntu2.2 libcurl3-nss 7.38.0-3ubuntu2.2 Ubuntu 14.10: libcurl3 7.37.1-1ubuntu3.4 libcurl3-gnutls 7.37.1-1ubuntu3.4 libcurl3-nss 7.37.1-1ubuntu3.4 Ubuntu 14.04 LTS: libcurl3 7.35.0-1ubuntu2.5 libcurl3-gnutls 7.35.0-1ubuntu2.5 libcurl3-nss 7.35.0-1ubuntu2.5 Ubuntu 12.04 LTS: libcurl3 7.22.0-3ubuntu4.14 libcurl3-gnutls 7.22.0-3ubuntu4.14 libcurl3-nss 7.22.0-3ubuntu4.14 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2591-1 CVE-2015-3143, CVE-2015-3144, CVE-2015-3145, CVE-2015-3148, CVE-2015-3153 Package Information: https://launchpad.net/ubuntu/+source/curl/7.38.0-3ubuntu2.2 https://launchpad.net/ubuntu/+source/curl/7.37.1-1ubuntu3.4 https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.5 https://launchpad.net/ubuntu/+source/curl/7.22.0-3ubuntu4.14 --LnuimdXJXNvhuXMl7f1ox2W7VEXoiEU6q Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVQi55AAoJEGVp2FWnRL6TstsP/j8TCc7sbv4YXoEYm0qtZT1o vU/h2yQmMB9Gs5+TaHseZ/uMpNycLHvAvV345nsvke2zx8WCkPgs7X7KHnZ0/9Dl hs3fqNO00CT9ddY2GmRLI3T8PQ664G/VfH5r9vV9T8dKZ7PZFJlq1JwIBM5hZvJH UOo7RVk1/ieY6hYJXw8lWc8m7YGUx7qbA/ygrRBbZ2gFeYz3+1RJXxMTMnrbDfJ6 QHAPZ0n2A5a5XQrkId+iwcXvX+HPO6rFRT2j+MBo9u0FRucyF371ZKSt2klT2pCE pDALgfpIYN/sE5n92TBpLwbfo4grcopXgXcxhEmY+hn21oLBxB091o9awXF2mw/E BrzsZAvoY6QtjzfKpFiGlFicg0dTIgvaeLyNC5OEWHZu/Mw2IJ8wdBO33/pXvYrQ pZxZXk0+umglsIjePXJmIlxCfX95yrpKKmBaXVeE9HizKT9yorNQN+p7c6S9WbP9 g3FwyFNASCYTnw8HgywLO3EmBLJGYShQk+CylppoWcZZwr/xMGOZSur45mZlHxj7 Hd90rPodhx2Y+1MxHsYKn1mEitGFeYR5nICq6GxOvQ+iizty5zw20taDuMY0amSk uS9FCA/9uH447u/Ai5YYrKaD3RUU9T8dFd3gz3Ys3+NuQpiH7xMMbzUnHeogBF9o lHk41VyV43r/0uqUpLku =MRAv -----END PGP SIGNATURE----- --LnuimdXJXNvhuXMl7f1ox2W7VEXoiEU6q-- --===============2299290769831821718== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============2299290769831821718==-- |