Package        : curl
Version        : 7.38.0-4+deb8u13
CVE ID         : CVE-2016-7141 CVE-2016-7167 CVE-2016-9586
		 CVE-2018-16839 CVE-2018-16842
Debian Bug     : 848958 837945 836918

Several vulnerabilities were discovered in cURL, an URL transfer
library.

CVE-2016-7141

    When built with NSS and the libnsspem.so library is available at
    runtime, allows an remote attacker to hijack the authentication of a
    TLS connection by leveraging reuse of a previously loaded client
    certificate from file for a connection for which no certificate has
    been set, a different vulnerability than CVE-2016-5420.

CVE-2016-7167

    Multiple integer overflows in the (1) curl_escape, (2)
    curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape
    functions in libcurl allow attackers to have unspecified impact via
    a string of length 0xffffffff, which triggers a heap-based buffer
    overflow.

CVE-2016-9586

    Curl is vulnerable to a buffer overflow when doing a large floating
    point output in libcurl's implementation of the printf() functions.
    If there are any applications that accept a format string from the
    outside without necessary input filtering, it could allow remote
    attacks.

CVE-2018-16839

    Curl is vulnerable to a buffer overrun in the SASL authentication
    code that may lead to denial of service.

CVE-2018-16842

    Curl is vulnerable to a heap-based buffer over-read in the
    tool_msgs.c:voutf() function that may result in information exposure
    and denial of service.

For Debian 8 "Jessie", these problems have been fixed in version
7.38.0-4+deb8u13.

We recommend that you upgrade your curl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-1568-1: curl security update

November 6, 2018
Several vulnerabilities were discovered in cURL, an URL transfer library

Summary

When built with NSS and the libnsspem.so library is available at
runtime, allows an remote attacker to hijack the authentication of a
TLS connection by leveraging reuse of a previously loaded client
certificate from file for a connection for which no certificate has
been set, a different vulnerability than CVE-2016-5420.

CVE-2016-7167

Multiple integer overflows in the (1) curl_escape, (2)
curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape
functions in libcurl allow attackers to have unspecified impact via
a string of length 0xffffffff, which triggers a heap-based buffer
overflow.

CVE-2016-9586

Curl is vulnerable to a buffer overflow when doing a large floating
point output in libcurl's implementation of the printf() functions.
If there are any applications that accept a format string from the
outside without necessary input filtering, it could allow remote
attacks.

CVE-2018-16839

Curl is vulnerable to a buffer overrun in the SASL authentication
code that may lead to denial of service.

CVE-2018-16842

Curl is vulnerable to a heap-based buffer over-read in the
tool_msgs.c:voutf() function that may result in information exposure
and denial of service.

For Debian 8 "Jessie", these problems have been fixed in version
7.38.0-4+deb8u13.

We recommend that you upgrade your curl packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : curl
Version : 7.38.0-4+deb8u13
CVE ID : CVE-2016-7141 CVE-2016-7167 CVE-2016-9586
Debian Bug : 848958 837945 836918

Related News