CVE-2013-0249
Published: 8 February 2013
Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
Notes
Author | Note |
---|---|
jdstrand | per upstream, curl < 7.26.0 is not affected |
Priority
Status
Package | Release | Status |
---|---|---|
curl Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
precise |
Not vulnerable
(7.22.0-3ubuntu4)
|
|
quantal |
Released
(7.27.0-1ubuntu1.1)
|
|
upstream |
Released
(7.29.0)
|
|
Patches: upstream: http://curl.haxx.se/curl-sasl.patch |
||
This vulnerability is mitigated in part by the use of -D_FORTIFY_SOURCE=2 in Ubuntu. |