This is the mail archive of the
cygwin-apps
mailing list for the Cygwin project.
Security advisory: curl
- From: "Yaakov S (Cygwin Ports)" <yselkowitz at users dot sourceforge dot net>
- To: cygwin-apps at cygwin dot com
- Date: Sun, 23 Oct 2005 14:46:25 -0500
- Subject: Security advisory: curl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
cURL is vulnerable to a buffer overflow which could lead to the
execution of arbitrary code.
Solution: upgrade to 7.15.0.
Workaround until solved:
Disable NTLM authentication by not using the --anyauth or --ntlm
options when using cURL (the command line version). Workarounds for
programs that use the cURL library depend on the configuration options
presented by those programs.
http://security.gentoo.org/glsa/glsa-200510-19.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFDW+iRpiWmPGlmQSMRAqtgAJ9Sw+lbZiPKVppjVF25cRicJ0Ss/ACffzx/
eyeGb3+a8JrTZZY0CnLw590=
=mPhz
-----END PGP SIGNATURE-----