CVE-2005-4077

Publication date 8 December 2005

Last updated 24 July 2024


Ubuntu priority

Multiple off-by-one errors in the cURL library (libcurl) 7.11.2 through 7.15.0 allow local users to trigger a buffer overflow and cause a denial of service or bypass PHP security restrictions via certain URLs that (1) are malformed in a way that prevents a terminating null byte from being added to either a hostname or path buffer, or (2) contain a ”?” separator in the hostname portion, which causes a ”/” to be prepended to the resulting string.

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
curl 7.04 feisty
Fixed 7.15.5-1ubuntu2.1
6.10 edgy
Fixed 7.15.4-1ubuntu2.2
6.06 LTS dapper
Fixed 7.15.1-1ubuntu2.1

References

Related Ubuntu Security Notices (USN)

    • USN-228-1
    • curl library vulnerability
    • 13 December 2005

Other references