Vulnerability Name:

CVE-2006-1061 (CCN-25318)

Assigned:2006-03-20
Published:2006-03-20
Updated:2017-07-20
Summary:Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.
Update to version 7.15.3.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Full-Disclosure Mailing List, Mon Mar 20 2006 - 05:27:43 CST
[SSAG#001] :: cURL tftp:// URL Buffer Overflow

Source: FULLDISC
Type: UNKNOWN
20060320 [SSAG#001] :: cURL tftp:// URL Buffer Overflow

Source: CCN
Type: cURL Web site
cURL and libcurl

Source: CCN
Type: cURL Security Advisory March 20 2006
libcurl TFTP Packet Buffer Overflow Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://curl.haxx.se/docs/adv_20060320.html

Source: MITRE
Type: CNA
CVE-2006-1061

Source: CCN
Type: SA19271
cURL/libcURL TFTP Protocol URL Parsing Buffer Overflow

Source: SECUNIA
Type: Patch, Vendor Advisory
19271

Source: SECUNIA
Type: UNKNOWN
19335

Source: SECUNIA
Type: UNKNOWN
19344

Source: SECUNIA
Type: UNKNOWN
19371

Source: CCN
Type: GLSA-200603-19
cURL/libcurl: Buffer overflow in the handling of TFTP URLs

Source: GENTOO
Type: UNKNOWN
GLSA-200603-19

Source: CCN
Type: OpenPKG-SA-2006.012
curl

Source: OSVDB
Type: UNKNOWN
23982

Source: CCN
Type: OSVDB ID: 23982
cURL/libcURL TFTP URL Parsing Overflow

Source: FEDORA
Type: UNKNOWN
FEDORA-2006-189

Source: BID
Type: UNKNOWN
17154

Source: CCN
Type: BID-17154
cURL / libcURL TFTP URL Parser Buffer Overflow Vulnerability

Source: TRUSTIX
Type: UNKNOWN
2006-0016

Source: VUPEN
Type: UNKNOWN
ADV-2006-1008

Source: XF
Type: UNKNOWN
curl-tftp-bo(25318)

Source: XF
Type: UNKNOWN
curl-tftp-bo(25318)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:daniel_stenberg:curl:7.15.0:*:*:*:*:*:*:*
  • OR cpe:/a:daniel_stenberg:curl:7.15.1:*:*:*:*:*:*:*
  • OR cpe:/a:daniel_stenberg:curl:7.15.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:112133
    P
    curl-7.79.1-1.1 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:105669
    P
    Security update for python-Pygments (Important)
    2021-12-01
    BACK
    daniel_stenberg curl 7.15.0
    daniel_stenberg curl 7.15.1
    daniel_stenberg curl 7.15.2