Security advisory: curl

Yaakov S (Cygwin Ports) yselkowitz@users.sourceforge.net
Sun Oct 23 19:46:00 GMT 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

cURL is vulnerable to a buffer overflow which could lead to the
execution of arbitrary code.

Solution:  upgrade to 7.15.0.

Workaround until solved:
Disable NTLM authentication by not using the --anyauth or --ntlm
options when using cURL (the command line version). Workarounds for
programs that use the cURL library depend on the configuration options
presented by those programs.

http://security.gentoo.org/glsa/glsa-200510-19.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities


Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDW+iRpiWmPGlmQSMRAqtgAJ9Sw+lbZiPKVppjVF25cRicJ0Ss/ACffzx/
eyeGb3+a8JrTZZY0CnLw590=
=mPhz
-----END PGP SIGNATURE-----



More information about the Cygwin-apps mailing list