Ubuntu Security Notice 3441-1 - Daniel Stenberg discovered that curl incorrectly handled large floating point output. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. Even Rouault discovered that curl incorrectly handled large file names when doing TFTP transfers. A remote attacker could use this issue to cause curl to crash, resulting in a denial of service, or possibly obtain sensitive memory contents. Various other issues were also addressed.
b0130c23f8916e72e2b583e6c7d268af318bf605fb5e0b272a99a1657ec8a6c0
==========================================================================
Ubuntu Security Notice USN-3441-1
October 10, 2017
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in curl.
Software Description:
- curl: HTTP, HTTPS, and FTP client and client libraries
Details:
Daniel Stenberg discovered that curl incorrectly handled large floating
point output. A remote attacker could use this issue to cause curl to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-9586)
Even Rouault discovered that curl incorrectly handled large file names when
doing TFTP transfers. A remote attacker could use this issue to cause curl
to crash, resulting in a denial of service, or possibly obtain sensitive
memory contents. (CVE-2017-1000100)
Brian Carpenter and Yongji Ouyang discovered that curl incorrectly handled
numerical range globbing. A remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly obtain
sensitive memory contents. (CVE-2017-1000101)
Max Dymond discovered that curl incorrectly handled FTP PWD responses. A
remote attacker could use this issue to cause curl to crash, resulting in a
denial of service. (CVE-2017-1000254)
Brian Carpenter discovered that curl incorrectly handled the --write-out
command line option. A local attacker could possibly use this issue to
obtain sensitive memory contents. (CVE-2017-7407)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
curl 7.52.1-4ubuntu1.2
libcurl3 7.52.1-4ubuntu1.2
libcurl3-gnutls 7.52.1-4ubuntu1.2
libcurl3-nss 7.52.1-4ubuntu1.2
Ubuntu 16.04 LTS:
curl 7.47.0-1ubuntu2.3
libcurl3 7.47.0-1ubuntu2.3
libcurl3-gnutls 7.47.0-1ubuntu2.3
libcurl3-nss 7.47.0-1ubuntu2.3
Ubuntu 14.04 LTS:
curl 7.35.0-1ubuntu2.11
libcurl3 7.35.0-1ubuntu2.11
libcurl3-gnutls 7.35.0-1ubuntu2.11
libcurl3-nss 7.35.0-1ubuntu2.11
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3441-1
CVE-2016-9586, CVE-2017-1000100, CVE-2017-1000101, CVE-2017-1000254,
CVE-2017-7407
Package Information:
https://launchpad.net/ubuntu/+source/curl/7.52.1-4ubuntu1.2
https://launchpad.net/ubuntu/+source/curl/7.47.0-1ubuntu2.3
https://launchpad.net/ubuntu/+source/curl/7.35.0-1ubuntu2.11