libcurl.so is susceptible to denial of service(DoS). The vulnerability exists because the curl_easy_unescape
function in lib/escape.c
only terminates string parsing when a zero byte is used, leading to heap corruption that can crash the application or cause arbitrary code to be executed.
curl.haxx.se/docs/adv_20130622.html
lists.opensuse.org/opensuse-updates/2013-07/msg00013.html
rhn.redhat.com/errata/RHSA-2013-0983.html
www.debian.org/security/2013/dsa-2713
www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
www.securityfocus.com/bid/60737
www.ubuntu.com/usn/USN-1894-1
access.redhat.com/security/updates/classification/#moderate
github.com/bagder/curl/commit/192c4f788d48f82c03e9cef40013f34370e90737
rhn.redhat.com/errata/RHSA-2013-0983.html