Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 9 Aug 2017 07:18:42 +0000 (UTC)
From:      Bernard Spil <brnrd@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r447592 - head/security/vuxml
Message-ID:  <201708090718.v797IgY3060464@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: brnrd
Date: Wed Aug  9 07:18:42 2017
New Revision: 447592
URL: https://svnweb.freebsd.org/changeset/ports/447592

Log:
  security/vuxml: Document today's cURL vulnerabilities

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Aug  9 06:30:49 2017	(r447591)
+++ head/security/vuxml/vuln.xml	Wed Aug  9 07:18:42 2017	(r447592)
@@ -58,6 +58,76 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="69cfa386-7cd0-11e7-867f-b499baebfeaf">
+    <topic>cURL -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>curl</name>
+	<range><lt>7.55.0</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The cURL project reports:</p>
+	<blockquote cite="https://curl.haxx.se/docs/security.html">;
+	  <ul>
+	    <li><h2>FILE buffer read out of bounds</h2>
+	      <p>When asking to get a file from a file:// URL, libcurl provides
+		a feature that outputs meta-data about the file using HTTP-like
+		headers.</p>
+	      <p>The code doing this would send the wrong buffer to the user
+		(stdout or the application's provide callback), which could
+		lead to other private data from the heap to get inadvertently
+		displayed.</p>
+	      <p>The wrong buffer was an uninitialized memory area allocated on
+		the heap and if it turned out to not contain any zero byte, it
+		would continue and display the data following that buffer in
+		memory.</p>
+	    </li>
+	    <li><h2>TFTP sends more than buffer size</h2>
+	      <p>When doing a TFTP transfer and curl/libcurl is given a URL that
+		contains a very long file name (longer than about 515 bytes),
+		the file name is truncated to fit within the buffer boundaries,
+		but the buffer size is still wrongly updated to use the
+		untruncated length. This too large value is then used in the
+		sendto() call, making curl attempt to send more data than what
+		is actually put into the buffer. The sendto() function will then
+		read beyond the end of the heap based buffer.</p>
+	      <p>A malicious HTTP(S) server could redirect a vulnerable libcurl-
+		using client to a crafted TFTP URL (if the client hasn't
+		restricted which protocols it allows redirects to) and trick it
+		to send private memory contents to a remote server over UDP.
+		Limit curl's redirect protocols with --proto-redir and libcurl's
+		with CURLOPT_REDIR_PROTOCOLS.</p>
+	    </li>
+	    <li><h2>URL globbing out of bounds read</h2>
+	      <p>curl supports "globbing" of URLs, in which a user can pass a
+		numerical range to have the tool iterate over those numbers to
+		do a sequence of transfers.</p>
+	      <p>In the globbing function that parses the numerical range, there
+		was an omission that made curl read a byte beyond the end of the
+		URL if given a carefully crafted, or just wrongly written, URL.
+		The URL is stored in a heap based buffer, so it could then be
+		made to wrongly read something else instead of crashing.</p>
+	      <p>An example of a URL that triggers the flaw would be
+		http://ur%20[0-60000000000000000000.</p>;
+	    </li>
+	  </ul>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://curl.haxx.se/docs/security.html</url>;
+      <cvename>CVE-2017-1000099</cvename>
+      <cvename>CVE-2017-1000100</cvename>
+      <cvename>CVE-2017-1000101</cvename>
+    </references>
+    <dates>
+      <discovery>2017-08-09</discovery>
+      <entry>2017-08-09</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="c1265e85-7c95-11e7-93af-005056925db4">
     <topic>Axis2 -- Security vulnerability on dependency Apache Commons FileUpload</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201708090718.v797IgY3060464>