Vigil@nce - cURL: three vulnerabilities
February 2017 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of cURL.
Impacted products: cURL, Debian, Fedora.
Severity: 2/4.
Creation date: 21/12/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in cURL.
An attacker can generate a buffer overflow via float numbers, in
order to trigger a denial of service, and possibly to run code.
[severity:2/4; CVE-2016-9586]
On WinCE platforms, an attacker can tamper with X.501 names in the
X.509 certificate validation process, in order to spoof a server.
[severity:2/4; CVE-2016-9952]
On WinCE platforms, an attacker can raise a read only buffer
overflow in the X.509 certificate validation process, in order to
read the server process memory or crash it. [severity:2/4;
CVE-2016-9953]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/cURL-three-vulnerabilities-21435