Security advisory: curl
Yaakov S (Cygwin Ports)
yselkowitz@users.sourceforge.net
Sun Oct 23 19:46:00 GMT 2005
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
cURL is vulnerable to a buffer overflow which could lead to the
execution of arbitrary code.
Solution: upgrade to 7.15.0.
Workaround until solved:
Disable NTLM authentication by not using the --anyauth or --ntlm
options when using cURL (the command line version). Workarounds for
programs that use the cURL library depend on the configuration options
presented by those programs.
http://security.gentoo.org/glsa/glsa-200510-19.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
Yaakov
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Cygwin)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFDW+iRpiWmPGlmQSMRAqtgAJ9Sw+lbZiPKVppjVF25cRicJ0Ss/ACffzx/
eyeGb3+a8JrTZZY0CnLw590=
=mPhz
-----END PGP SIGNATURE-----
More information about the Cygwin-apps
mailing list