ID CVE-2006-1061
Summary Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path. Update to version 7.15.3.
References
Vulnerable Configurations
  • cpe:2.3:a:daniel_stenberg:curl:7.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:curl:7.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:curl:7.15.1:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:curl:7.15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:daniel_stenberg:curl:7.15.2:*:*:*:*:*:*:*
    cpe:2.3:a:daniel_stenberg:curl:7.15.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 20-07-2017 - 01:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17154
confirm http://curl.haxx.se/docs/adv_20060320.html
fedora FEDORA-2006-189
fulldisc 20060320 [SSAG#001] :: cURL tftp:// URL Buffer Overflow
gentoo GLSA-200603-19
osvdb 23982
secunia
  • 19271
  • 19335
  • 19344
  • 19371
trustix 2006-0016
vupen ADV-2006-1008
xf curl-tftp-bo(25318)
Last major update 20-07-2017 - 01:30
Published 21-03-2006 - 01:06
Last modified 20-07-2017 - 01:30
Back to Top