==========================================================================
Ubuntu Security Notice USN-3598-2
May 24, 2018
curl vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in curl.
Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries
Details:
USN-3598-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Phan Thanh discovered that curl incorrectly handled certain FTP paths.
An attacker could use this to cause a denial of service or possibly
execute arbitrary code. (CVE-2018-1000120)
Dario Weisser discovered that curl incorrectly handled certain LDAP
URLs. An attacker could possibly use this issue to cause a denial of
service. (CVE-2018-1000121)
Max Dymond discovered that curl incorrectly handled certain RTSP data.
An attacker could possibly use this to cause a denial of service or
even to get access to sensitive data. (CVE-2018-1000122)
Max Dymond discovered that curl incorrectly handled certain RTSP
responses. If a user or automated system were tricked into connecting
to a malicious server, a remote attacker could use this issue to cause
curl to crash, resulting in a denial of service, or possibly obtain
sensitive information. (CVE-2018-1000301)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 ESM:
curl 7.22.0-3ubuntu4.21
libcurl3 7.22.0-3ubuntu4.21
libcurl3-gnutls 7.22.0-3ubuntu4.21
libcurl3-nss 7.22.0-3ubuntu4.21
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3598-2
https://usn.ubuntu.com/usn/usn-3598-1
CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=Vzeh
—–END PGP SIGNATURE—–
—