cURL/libcURL 'Curl_sasl_create_digest_md5_message()' Stack Buffer Overflow

high Nessus Network Monitor Plugin ID 6901

Synopsis

The cURL program is a library and command-line tool for transferring data using various protocols, including HTTP, FTP, and LDAP. A vulnerable version of cURL was detected from the host.

Description

A stack buffer overflow flaw was found due to the application failing to properly bounds-check user supplied data before copying it into an insufficiently sized buffer. A remote attacker could exploit this issue to execute arbitrary code in the context of the affected application. (CVE-2013-2174)

Affected versions include versions 7.26.0 through 7.28.1.

Solution

Upgrade the affected packages; the next version of cURL that fixes the issue is cURL 7.29.0.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=906779

http://curl.haxx.se/docs/adv_20130206.html

Plugin Details

Severity: High

ID: 6901

Family: Web Clients

Published: 7/1/2013

Updated: 3/6/2019

Nessus ID: 64869

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:haxx:curl

Patch Publication Date: 2/8/2013

Vulnerability Publication Date: 2/6/2013

Reference Information

CVE: CVE-2013-0249

BID: 57842