First published: Fri Mar 08 2013(Updated: )
Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Haxx Curl | =7.26.0 | |
Haxx Curl | =7.27.0 | |
Haxx Curl | =7.28.0 | |
Haxx Curl | =7.28.1 | |
Haxx Libcurl | =7.26.0 | |
Haxx Libcurl | =7.27.0 | |
Haxx Libcurl | =7.28.0 | |
Haxx Libcurl | =7.28.1 | |
Canonical Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.