SuSE: 2005-011: curl buffer overflow in NTLM authentication Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: curl
Announcement-ID: SUSE-SA:2005:011
Date: Mon, 28 Feb 2005 12:00:00 +0000
Affected products: 9.1, 9.2
SUSE Linux Enterprise Server 9
Novell Linux Desktop 9
Vulnerability Type: remote code execution
Severity (1-10): 10
SUSE default package: yes
Cross References: CAN-2005-0490
Content of this advisory:
1) security vulnerability resolved:
buffer overflow in curl NTLM authentication
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
See SUSE Security Summary Report.
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
infamous41md@hotpop.com reported a vulnerability in libcurl, the
HTTP/FTP retrieval library. This library is used by lots of programs,
including YaST2 and PHP4.
The NTLM authorization in curl had a buffer overflow in the base64
decoding which allows a remote attacker using a prepared remote
server to execute code for the user using curl.
The Kerberos authorization has a similar bug, but is not compiled
in on SUSE Linux.
This is tracked by the Mitre CVE ID CAN-2005-0490.
2) solution/workaround
None, please install the fixed packages.
3) special instructions and notes
If you are using a service that uses libcurl, please restart this
service.
This list potentially includes the PHP4 support of the Apache and
Apache2 web servers.
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.2:
10bdaa686d6fbc08cbe4620c91e6f33b
fcab29842a028c41dbf5910a6b24c0e2
SUSE Linux 9.1:
285dc0e7bafa207c2ab5f1c3081e2cdc
f0d88e1e0c78a8db1ae9adce3607a18e
x86-64 Platform:
SUSE Linux 9.2:
724387fba668aaf1f8772f5e45320676
0c53e24c16610908324f3f4bb51174bd
source rpm(s):
fb2533e28b02a5f2bdfe001e6c3c3d0a
SUSE Linux 9.1:
08ae9314b886b1e51b422943aa42d210
44ca3527474d574bfca573efe78cd259
source rpm(s):
f8b455755a9da06399cfbe10edcf2b9f
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References