5.1 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.007 Low
EPSS
Percentile
80.4%
CentOS Errata and Security Advisory CESA-2005:340
cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, and
Dict servers, using any of the supported protocols. cURL is designed
to work without user interaction or any kind of interactivity.
Multiple buffer overflow bugs were found in the way curl processes base64
encoded replies. If a victim can be tricked into visiting a URL with curl,
a malicious web server could execute arbitrary code on a victim’s machine.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0490 to this issue.
All users of curl are advised to upgrade to these updated
packages, which contain backported fixes for these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-April/073693.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073694.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073700.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073704.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073705.html
https://lists.centos.org/pipermail/centos-announce/2005-April/073707.html
Affected packages:
curl
curl-devel
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:340
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | i386 | curl | < 7.10.6-6.rhel3 | curl-7.10.6-6.rhel3.i386.rpm |
CentOS | 3 | x86_64 | curl | < 7.10.6-6.rhel3 | curl-7.10.6-6.rhel3.x86_64.rpm |
CentOS | 3 | x86_64 | curl-devel | < 7.10.6-6.rhel3 | curl-devel-7.10.6-6.rhel3.x86_64.rpm |
CentOS | 3 | i386 | curl | < 7.10.6-6.rhel3 | curl-7.10.6-6.rhel3.i386.rpm |
CentOS | 3 | i386 | curl-devel | < 7.10.6-6.rhel3 | curl-devel-7.10.6-6.rhel3.i386.rpm |
CentOS | 3 | ia64 | curl | < 7.10.6-6.rhel3 | curl-7.10.6-6.rhel3.ia64.rpm |
CentOS | 3 | ia64 | curl-devel | < 7.10.6-6.rhel3 | curl-devel-7.10.6-6.rhel3.ia64.rpm |
CentOS | 4 | ia64 | curl | < 7.12.1-5.rhel4 | curl-7.12.1-5.rhel4.ia64.rpm |
CentOS | 4 | ia64 | curl-devel | < 7.12.1-5.rhel4 | curl-devel-7.12.1-5.rhel4.ia64.rpm |
CentOS | 3 | s390 | curl | < 7.10.6-6.rhel3 | curl-7.10.6-6.rhel3.s390.rpm |
5.1 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.007 Low
EPSS
Percentile
80.4%