Upstream information

CVE-2006-1061 at MITRE


Heap-based buffer overflow in cURL and libcURL 7.15.0 through 7.15.2 allows remote attackers to execute arbitrary commands via a TFTP URL (tftp://) with a valid hostname and a long path.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 157874 [RESOLVED / FIXED]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • curl >= 7.79.1-1.1
  • libcurl-devel >= 7.79.1-1.1
  • libcurl-devel-32bit >= 7.79.1-1.1
  • libcurl4 >= 7.79.1-1.1
  • libcurl4-32bit >= 7.79.1-1.1
openSUSE Tumbleweed GA curl-7.79.1-1.1

SUSE Timeline for this CVE

CVE page created: Fri Jun 28 01:50:47 2013
CVE page last modified: Fri Oct 7 12:45:33 2022