Vulnerabilities > CVE-2005-4077 - Numeric Errors vulnerability in Daniel Stenberg Curl

047910
CVSS 4.6 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
local
low complexity
daniel-stenberg
CWE-189
nessus

Summary

Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-1136.NASL
    descriptionThis package fixes a security buffer overflow bug in URL authentication code of curl (CVE-2005-4077), previous patch did not fix this problem completely. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20304
    published2005-12-15
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20304
    titleFedora Core 3 : curl-7.12.3-6.fc3 (2005-1136)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200512-09.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200512-09 (cURL: Off-by-one errors in URL handling) Stefan Esser from the Hardened-PHP Project has reported a vulnerability in cURL that allows for a local buffer overflow when cURL attempts to parse specially crafted URLs. The URL can be specially crafted in one of two ways: the URL could be malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer; or the URL could contain a
    last seen2020-06-01
    modified2020-06-02
    plugin id20329
    published2005-12-20
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20329
    titleGLSA-200512-09 : cURL: Off-by-one errors in URL handling
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-1137.NASL
    descriptionThis package fixes a security buffer overflow bug in URL authentication code of curl (CVE-2005-4077), previous patch did not fix this problem completely. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20305
    published2005-12-15
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20305
    titleFedora Core 4 : curl-7.13.1-5.fc4 (2005-1137)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-919.NASL
    descriptionThe upstream developer of curl, a multi-protocol file transfer library, informed us that the former correction to several off-by-one errors are not sufficient. For completeness please find the original bug description below : Several problems were discovered in libcurl, a multi-protocol file transfer library. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2005-3185 A buffer overflow has been discovered in libcurl that could allow the execution of arbitrary code. - CVE-2005-4077 Stefan Esser discovered several off-by-one errors that allows local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs.
    last seen2020-06-01
    modified2020-06-02
    plugin id22785
    published2006-10-14
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22785
    titleDebian DSA-919-2 : curl - buffer overflow
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2006-003.NASL
    descriptionThe remote host is running Apple Mac OS X, but lacks Security Update 2006-003. This security update contains fixes for the following applications : AppKit ImageIO BOM CFNetwork ClamAV (Mac OS X Server only) CoreFoundation CoreGraphics Finder FTPServer Flash Player KeyCHain LaunchServices libcurl Mail MySQL Manager (Mac OS X Server only) Preview QuickDraw QuickTime Streaming Server Ruby Safari
    last seen2020-06-01
    modified2020-06-02
    plugin id21341
    published2006-05-12
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21341
    titleMac OS X Multiple Vulnerabilities (Security Update 2006-003)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-1130.NASL
    descriptionThis package fixes a security buffer overflow bug in URL authentication code of curl (CVE-2005-4077). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20290
    published2005-12-11
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20290
    titleFedora Core 3 : curl-7.12.3-5.fc3 (2005-1130)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2008-002.NASL
    descriptionThe remote host is running a version of Mac OS X 10.5 or 10.4 that does not have the security update 2008-002 applied. This update contains several security fixes for a number of programs.
    last seen2020-06-01
    modified2020-06-02
    plugin id31605
    published2008-03-19
    reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/31605
    titleMac OS X Multiple Vulnerabilities (Security Update 2008-002)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2005-875.NASL
    descriptionUpdated curl packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. Stefan Esser discovered an off-by-one bug in curl. It may be possible to execute arbitrary code on a user
    last seen2020-06-01
    modified2020-06-02
    plugin id20364
    published2005-12-30
    reporterThis script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/20364
    titleRHEL 4 : curl (RHSA-2005:875)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_9B4FACEC676111DA99F600123FFE8333.NASL
    descriptionA Project cURL Security Advisory reports : libcurl
    last seen2020-06-01
    modified2020-06-02
    plugin id21483
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21483
    titleFreeBSD : curl -- URL buffer overflow vulnerability (9b4facec-6761-11da-99f6-00123ffe8333)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2005-875.NASL
    descriptionUpdated curl packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and Dict servers, using any of the supported protocols. Stefan Esser discovered an off-by-one bug in curl. It may be possible to execute arbitrary code on a user
    last seen2020-06-01
    modified2020-06-02
    plugin id21973
    published2006-07-05
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21973
    titleCentOS 4 : curl (CESA-2005:875)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2005-1129.NASL
    descriptionThis package fixes a security buffer overflow bug in URL authentication code of curl (CVE-2005-4077). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20289
    published2005-12-11
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20289
    titleFedora Core 4 : curl-7.13.1-4.fc4 (2005-1129)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-228-1.NASL
    descriptionStefan Esser discovered several buffer overflows in the handling of URLs. By attempting to load an URL with a specially crafted invalid hostname, a local attacker could exploit this to execute arbitrary code with the privileges of the application that uses the cURL library. It is not possible to trick cURL into loading a malicious URL with an HTTP redirect, so this vulnerability was usually not exploitable remotely. However, it could be exploited locally to e. g. circumvent PHP security restrictions. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id20771
    published2006-01-21
    reporterUbuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20771
    titleUbuntu 4.10 / 5.04 / 5.10 : curl vulnerability (USN-228-1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200603-25.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200603-25 (OpenOffice.org: Heap overflow in included libcurl) OpenOffice.org includes libcurl code. This libcurl code is vulnerable to a heap overflow when it tries to parse a URL that exceeds a 256-byte limit (GLSA 200512-09). Impact : An attacker could entice a user to call a specially crafted URL with OpenOffice.org, potentially resulting in the execution of arbitrary code with the rights of the user running the application. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id21160
    published2006-03-28
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21160
    titleGLSA-200603-25 : OpenOffice.org: Heap overflow in included libcurl
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2005-224.NASL
    descriptionStefan Esser discovered that libcurl
    last seen2020-06-01
    modified2020-06-02
    plugin id20455
    published2006-01-15
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20455
    titleMandrake Linux Security Advisory : curl (MDKSA-2005:224)

Oval

accepted2013-04-29T04:09:24.402-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
descriptionMultiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.
familyunix
idoval:org.mitre.oval:def:10855
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleMultiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a "?" separator in the hostname portion, which causes a "/" to be prepended to the resulting string.
version26

Redhat

advisories
rhsa
idRHSA-2005:875
rpms
  • curl-0:7.12.1-8.rhel4
  • curl-debuginfo-0:7.12.1-8.rhel4
  • curl-devel-0:7.12.1-8.rhel4

References