CVE-2013-0249

Publication date 8 February 2013

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
curl 12.10 quantal
Fixed 7.27.0-1ubuntu1.1
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected

Notes


jdstrand

per upstream, curl < 7.26.0 is not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
curl

References

Related Ubuntu Security Notices (USN)

Other references