- ------------------------------------------------------------------------
Debian Security Advisory                             security@debian.org 
Debian -- Security Information                          Wichert Akkerman
October 13, 2000
- ------------------------------------------------------------------------


Package        : curl and curl-ssl
Problem type   : remote exploit
Debian-specific: no

The version of curl as distributed with Debian GNU/Linux 2.2 had a bug
in the error logging code: when it created an error message it failed to
check the size of the buffer allocated for storing the message. This
could be exploited by the remote machine by returning an invalid
response to a request from curl which overflows the error buffer and
trick curl into executing arbitrary code.

Debian ships with two versions of curl: the normal curl package, and the
crypto-enabled curl-ssl package. This bug has been fixed in curl version
6.0-1.1 and curl-ssl version 6.0-1.2 .

We recommend you upgrade your curl or curl-ssl package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

  Slink did not contain curl or curl-ssl.

Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At
  this moment packages for m68k are not yet available; they will later be
  announce on  Debian -- Security Information  .

  Fixed curl-ssl packages:

  Source archives:
    
 
      MD5 checksum: bdfd882127d9f246402be6f9cc8d02d3
    
 
      MD5 checksum: 965a98adeb70df08f5219565c5d2a0cb
 
 
      MD5 checksum: dffbc34bc3c19d8e8c6a11495aa744fe

  Alpha architecture:
    
 
      MD5 checksum: 2c8992652534aa6d7e2fc95473a469a7

  ARM architecture:
    
 
      MD5 checksum: 168a025e9374b2f96eeae3736bff094f

  Intel ia32 architecture:
    
 
      MD5 checksum: 7ad6efee7ec787a450911fbc40111468

  PowerPC architecture:
    
 
      MD5 checksum: 1d62c52cbb711cea17c375978de09e7f

  Sun Sparc architecture:
    
 
      MD5 checksum: c631f9b4f4789d6ba779d8ebc5ec4867


  Fixed curl packages:

  Source archives:
    
 
      MD5 checksum: a95dde95e6a072bd44a8e59b9f3d0e49
    
 
      MD5 checksum: d35d95a7e1b8e1d19692d27edecd2155
    
 
      MD5 checksum: dffbc34bc3c19d8e8c6a11495aa744fe

  Alpha architecture:
    
 
      MD5 checksum: dbbe286ceabcd21e398f5bf9566182d0

  ARM architecture:
    
 
      MD5 checksum: 9fb58f2b273e68b3ba00ebcf53737fa4

  Intel ia32 architecture:
    
 
      MD5 checksum: 36bd0030616c54c60fb0ba2df5c31530

  PowerPC architecture:
    
 
      MD5 checksum: d0cb857833f793276bd467773c3e58cf

  Sun Sparc architecture:
    
 
      MD5 checksum: 99f5c19a778e67eec371b316202274c0


  These files will be moved into
     soon.

For not yet released architectures please refer to the appropriate
directory    .

- ----------------------------------------------------------------------------
apt-get: deb  Debian -- Security Information  stable/updates main
dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org


Debian: 'curl' and 'curl-ssl' updates

October 13, 2000
The version of curl as distributed with Debian GNU/Linux 2.2 had a bug in the error logging code.

Summary

Package : curl and curl-ssl
Problem type : remote exploit
Debian-specific: no

The version of curl as distributed with Debian GNU/Linux 2.2 had a bug
in the error logging code: when it created an error message it failed to
check the size of the buffer allocated for storing the message. This
could be exploited by the remote machine by returning an invalid
response to a request from curl which overflows the error buffer and
trick curl into executing arbitrary code.

Debian ships with two versions of curl: the normal curl package, and the
crypto-enabled curl-ssl package. This bug has been fixed in curl version
6.0-1.1 and curl-ssl version 6.0-1.2 .

We recommend you upgrade your curl or curl-ssl package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

Debian GNU/Linux 2.1 alias slink

Slink did not contain curl or curl-ssl.

Debian GNU/Linux 2.2 alias potato

Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At
this moment packages for m68k are not yet available; they will later be
announce on Debian -- Security Information .

Fixed curl-ssl packages:

Source archives:


MD5 checksum: bdfd882127d9f246402be6f9cc8d02d3


MD5 checksum: 965a98adeb70df08f5219565c5d2a0cb


MD5 checksum: dffbc34bc3c19d8e8c6a11495aa744fe

Alpha architecture:


MD5 checksum: 2c8992652534aa6d7e2fc95473a469a7

ARM architecture:


MD5 checksum: 168a025e9374b2f96eeae3736bff094f

Intel ia32 architecture:


MD5 checksum: 7ad6efee7ec787a450911fbc40111468

PowerPC architecture:


MD5 checksum: 1d62c52cbb711cea17c375978de09e7f

Sun Sparc architecture:


MD5 checksum: c631f9b4f4789d6ba779d8ebc5ec4867


Fixed curl packages:

Source archives:


MD5 checksum: a95dde95e6a072bd44a8e59b9f3d0e49


MD5 checksum: d35d95a7e1b8e1d19692d27edecd2155


MD5 checksum: dffbc34bc3c19d8e8c6a11495aa744fe

Alpha architecture:


MD5 checksum: dbbe286ceabcd21e398f5bf9566182d0

ARM architecture:


MD5 checksum: 9fb58f2b273e68b3ba00ebcf53737fa4

Intel ia32 architecture:


MD5 checksum: 36bd0030616c54c60fb0ba2df5c31530

PowerPC architecture:


MD5 checksum: d0cb857833f793276bd467773c3e58cf

Sun Sparc architecture:


MD5 checksum: 99f5c19a778e67eec371b316202274c0


These files will be moved into
soon.

For not yet released architectures please refer to the appropriate
directory .

apt-get: deb Debian -- Security Information stable/updates main
dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org




Severity

Related News