[USN-3598-2] curl vulnerabilities


–===============4385702735651793032==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-z9OpbsUY8PuNJNnsFcoe”

–=-z9OpbsUY8PuNJNnsFcoe
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3598-2
May 24, 2018

curl vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in curl.

Software Description:
– curl: HTTP, HTTPS, and FTP client and client libraries

Details:

USN-3598-1 fixed a vulnerability in curl. This update provides
the corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

=C2=A0Phan Thanh discovered that curl incorrectly handled certain FTP paths=
.
=C2=A0An attacker could use this to cause a denial of service or possibly
=C2=A0execute arbitrary code. (CVE-2018-1000120)

=C2=A0Dario Weisser discovered that curl incorrectly handled certain LDAP
=C2=A0URLs. An attacker could possibly use this issue to cause a denial of
=C2=A0service. (CVE-2018-1000121)

=C2=A0Max Dymond discovered that curl incorrectly handled certain RTSP data=
.
=C2=A0An attacker could possibly use this to cause a denial of service or
=C2=A0even to get access to sensitive data. (CVE-2018-1000122)

=C2=A0Max Dymond discovered that curl incorrectly handled certain RTSP
=C2=A0responses. If a user or automated system were tricked into connecting
=C2=A0to a malicious server, a remote attacker could use this issue to caus=
e
=C2=A0curl to crash, resulting in a denial of service, or possibly obtain
=C2=A0sensitive information. (CVE-2018-1000301)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 curl=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A07.22.0-3ubuntu4.21
=C2=A0 libcurl3=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A07.22.0-3ubuntu4.21
=C2=A0 libcurl3-gnutls=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A07.22.0-3ubuntu4.21
=C2=A0 libcurl3-nss=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A07.22.0-3u=
buntu4.21

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3598-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3598-1
=C2=A0 CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-10003=
01
–=-z9OpbsUY8PuNJNnsFcoe
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=Vzeh
—–END PGP SIGNATURE—–

–=-z9OpbsUY8PuNJNnsFcoe–

–===============4385702735651793032==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============4385702735651793032==–