First published: Fri Mar 08 2013(Updated: )
Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Curl | =7.26.0 | |
Curl | =7.27.0 | |
Curl | =7.28.0 | |
Curl | =7.28.1 | |
libcurl | =7.26.0 | |
libcurl | =7.27.0 | |
libcurl | =7.28.0 | |
libcurl | =7.28.1 | |
Ubuntu | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0249 is rated as high severity due to its potential to lead to a denial of service and arbitrary code execution.
To fix CVE-2013-0249, upgrade Curl or libcurl to versions 7.29.0 or later.
Curl versions 7.26.0 to 7.28.1 are affected by CVE-2013-0249.
Yes, CVE-2013-0249 can be exploited remotely through crafted SASL DIGEST-MD5 authentication messages.
CVE-2013-0249 can cause a denial of service, potentially leading to crashes or the execution of arbitrary code on affected systems.