Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2005:224: curl Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the curl package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2005:224 (curl).

Stefan Esser discovered that libcurl's URL parser function can have a malloced
buffer overflows in two ways if given a too long URL. It cannot be triggered by
a redirect, which makes remote exploitation unlikely, but can be passed
directly to libcurl (allowing for local exploitation) and could also be used to
break out of PHP's safe_mode/ open_basedir. This vulnerability only exists in
libcurl and curl 7.11.2 up to and including 7.15.0, which means that Corporate
Server 2.1 and Corporate 3.0 are not vulnerable. The updated packages have been
patched to correct the problem. As well, updated php-curl packages are
available that provide a new curl PHP module compiled against the fixed code.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.