cURL / libcURL TFTP URL Parser Buffer Overflow Vulnerability

Bugtraq ID: 17154
Class: Boundary Condition Error
CVE: CVE-2006-1061
Remote: Yes
Local: Yes
Published: Mar 20 2006 12:00AM
Updated: Jul 28 2006 11:32PM
Credit: Ulf Harnhammar Project is credited with the discovery of this vulnerability.
Vulnerable: Trustix Secure Linux 3.0
Trustix Secure Linux 2.2
Red Hat Fedora Core5
OpenPKG OpenPKG 2.5
OpenPKG OpenPKG 2.0
OpenPKG OpenPKG Current
Gentoo Linux
Daniel Stenberg curl 7.15.2
Daniel Stenberg curl 7.15.1
Daniel Stenberg curl 7.15
Not Vulnerable: Daniel Stenberg curl 7.15.3
Daniel Stenberg curl 7.14.1
Daniel Stenberg curl 7.14
Daniel Stenberg curl 7.13.2
Daniel Stenberg curl 7.13.1
Daniel Stenberg curl 7.13
Daniel Stenberg curl 7.13
Daniel Stenberg curl 7.12.3
Daniel Stenberg curl 7.12.2
Daniel Stenberg curl 7.12.1
+ Red Hat Enterprise Linux AS 4
+ RedHat Desktop 4.0
+ RedHat Enterprise Linux ES 4
+ RedHat Enterprise Linux WS 4
Daniel Stenberg curl 7.12
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Daniel Stenberg curl 7.11.2
Daniel Stenberg curl 7.11.1
+ Conectiva Linux 10.0
Daniel Stenberg curl 7.11
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
Daniel Stenberg curl 7.10.8
Daniel Stenberg curl 7.10.7
Daniel Stenberg curl 7.10.6
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
Daniel Stenberg curl 7.10.5
Daniel Stenberg curl 7.10.4
Daniel Stenberg curl 7.10.3
Daniel Stenberg curl 7.10.2
Daniel Stenberg curl 7.10.1
Daniel Stenberg curl 7.10


 

Privacy Statement
Copyright 2010, SecurityFocus