Lucene search

K
debianDebianDEBIAN:DLA-3763-1:D1B38
HistoryMar 17, 2024 - 10:44 a.m.

[SECURITY] [DLA 3763-1] curl security update

2024-03-1710:44:57
lists.debian.org
13
curl
security update
path traversal
sftp implementation
debian 10 buster

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

51.2%


Debian LTS Advisory DLA-3763-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
March 17, 2024 https://wiki.debian.org/LTS


Package : curl
Version : 7.64.0-4+deb10u9
CVE ID : CVE-2023-27534

curl was affected by a path traversal vulnerability.
SFTP implementation causes the tilde (~) character to be wrongly
replaced when used as a prefix in the first path element,
in addition to its intended use as the first element to indicate
a path relative to the user's home directory. Attackers can exploit
this flaw to bypass filtering or execute arbitrary code by
crafting a path like /~2/foo while accessing a server with
a specific user.

For Debian 10 buster, this problem has been fixed in version
7.64.0-4+deb10u9.

We recommend that you upgrade your curl packages.

For the detailed security status of curl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/curl

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

51.2%