Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2009-0341

Опубликовано: 19 мар. 2009
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2009-0341: curl security update (MODERATE)

[7.15.5-2.1.el5_3.4]

  • another correction of the patch for CVE-2009-0037

[7.15.5-2.1.el5_3.3]

  • forwardport one hunk from upstream curl-7.15.1 Related: #485290

[7.15.5-2.1.el5_3.2]

  • fix hunk applied to wrong place due to nonzero patch fuzz Related: #485289

[7.15.5-2.1.el5_3.1]

  • fix CVE-2009-0037 Resolves: #485289

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

curl

7.15.5-2.1.el5_3.4

curl-devel

7.15.5-2.1.el5_3.4

Oracle Linux i386

curl

7.15.5-2.1.el5_3.4

curl-devel

7.15.5-2.1.el5_3.4

Связанные CVE

Связанные уязвимости

ubuntu
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

redhat
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

nvd
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.

debian
больше 16 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, w ...

github
около 3 лет назад

The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.