Debian DLA-1672-1 : curl security update

high Nessus Plugin ID 122099

Synopsis

The remote Debian host is missing a security update.

Description

It was discovered that there were three vulnerabilities in the curl command-line HTTP (etc.) client :

- CVE-2018-16890: A heap buffer out-of-bounds read vulnerability in the handling of NTLM type-2 messages.

- CVE-2019-3822: Stack-based buffer overflow in the handling of outgoing NTLM type-3 headers.

- CVE-2019-3823: Heap out-of-bounds read in code handling the end of a response in the SMTP protocol.

For Debian 8 'Jessie', this issue has been fixed in curl version 7.38.0-4+deb8u14.

We recommend that you upgrade your curl packages.

NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Upgrade the affected packages.

See Also

https://lists.debian.org/debian-lts-announce/2019/02/msg00018.html

https://packages.debian.org/source/jessie/curl

Plugin Details

Severity: High

ID: 122099

File Name: debian_DLA-1672.nasl

Version: 1.3

Type: local

Agent: unix

Published: 2/12/2019

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:curl, p-cpe:/a:debian:debian_linux:libcurl3, p-cpe:/a:debian:debian_linux:libcurl3-nss, p-cpe:/a:debian:debian_linux:libcurl4-gnutls-dev, p-cpe:/a:debian:debian_linux:libcurl3-dbg, cpe:/o:debian:debian_linux:8.0, p-cpe:/a:debian:debian_linux:libcurl3-gnutls, p-cpe:/a:debian:debian_linux:libcurl4-doc, p-cpe:/a:debian:debian_linux:libcurl4-nss-dev, p-cpe:/a:debian:debian_linux:libcurl4-openssl-dev

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2/11/2019

Vulnerability Publication Date: 2/11/2019