Bug 927608 (CVE-2015-3144) - VUL-0: CVE-2015-3144: curl: host name out of boundary memory access
Summary: VUL-0: CVE-2015-3144: curl: host name out of boundary memory access
Status: RESOLVED FIXED
Alias: CVE-2015-3144
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-05-04
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:running:61571:moderate
Keywords:
Depends on:
Blocks:
 
Reported: 2015-04-17 11:51 UTC by Marcus Meissner
Modified: 2015-06-18 08:38 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
CVE-2015-3144.patch (1.23 KB, patch)
2015-04-19 08:53 UTC, Marcus Meissner
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Swamp Workflow Management 2015-04-17 22:01:04 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2015-04-19 08:53:34 UTC
Created attachment 631533 [details]
CVE-2015-3144.patch

CVE-2015-3144.patch
Comment 4 Swamp Workflow Management 2015-04-20 15:17:01 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2015-05-04.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/61571
Comment 6 Bernhard Wiedemann 2015-04-22 09:00:22 UTC
This is an autogenerated message for OBS integration:
This bug (927608) was mentioned in
https://build.opensuse.org/request/show/298499 13.2+13.1 / curl
Comment 7 Andreas Stieger 2015-04-22 09:51:16 UTC
public via http://curl.haxx.se/docs/adv_20150422D.html

host name out of boundary memory access 
=======================================

Project cURL Security Advisory, April 22nd 2015 -
[Permalink](http://curl.haxx.se/docs/adv_20150422D.html)

VULNERABILITY
-------------

There is a private function in libcurl called `fix_hostname()` that removes a
trailing dot from the host name if there is one. The function is called after
the host name has been extracted from the URL libcurl has been told to act on.

If a URL is given with a zero-length host name, like in "http://:80" or just
":80", `fix_hostname()` will index the host name pointer with a -1 offset (as
it blindly assumes a non-zero length) and both read and assign that address.

At best, this gets unnoticed but can also lead to a crash or worse. We have
not researched further what kind of malicious actions that potentially this
could be used for.

We are not aware of any exploits of this flaw.

INFO
----

This flaw can also be triggered with the curl command line tool.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2015-3144 to this issue.

AFFECTED VERSIONS
-----------------

- Affected versions: from libcurl 7.37.0 to and including 7.41.0
- Not affected versions: libcurl >= 7.42.0

libcurl is used by many applications, but not always advertised as such!

THE SOLUTION
------------

libcurl 7.42.0 better verifies the input string to the affected function.

A patch for this problem is available at [URL will be updated]:

    http://curl.haxx.se/CVE-2015-3144.patch

RECOMMENDATIONS
---------------

We suggest you take one of the following actions immediately, in order of
preference:

A - Upgrade to curl and libcurl 7.42.0

B - Apply the patch and rebuild libcurl

C - Avoid using URLs with zero-length host names!

TIME LINE
---------

It was first reported to the curl project on April 16 2015. We contacted
distros@openwall on April 17th.

libcurl 7.42.0 was released on April 22nd 2015, coordinated with the
publication of this advisory.

CREDITS
-------

Reported by Hanno Böck

Thanks a lot!
Comment 9 Swamp Workflow Management 2015-04-29 09:05:35 UTC
openSUSE-SU-2015:0799-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 927556,927607,927608,927746
CVE References: CVE-2015-3143,CVE-2015-3144,CVE-2015-3145,CVE-2015-3148
Sources used:
openSUSE 13.2 (src):    curl-7.42.0-7.1
openSUSE 13.1 (src):    curl-7.42.0-2.38.1
Comment 12 Swamp Workflow Management 2015-06-03 07:05:31 UTC
SUSE-SU-2015:0990-1: An update that fixes 5 vulnerabilities is now available.

Category: security (moderate)
Bug References: 927556,927607,927608,927746,928533
CVE References: CVE-2015-3143,CVE-2015-3144,CVE-2015-3145,CVE-2015-3148,CVE-2015-3153
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    curl-7.37.0-15.1
SUSE Linux Enterprise Server 12 (src):    curl-7.37.0-15.1
SUSE Linux Enterprise Desktop 12 (src):    curl-7.37.0-15.1
Comment 13 Marcus Meissner 2015-06-18 08:38:28 UTC
released