rPath Security Advisory: 2009-0042-1 Published: 2009-03-12 Products: rPath Appliance Platform Linux Service 1 rPath Appliance Platform Linux Service 2 rPath Linux 1 rPath Linux 2 Rating: Critical Exposure Level Classification: Remote Root Deterministic Unauthorized Access Updated Versions: curl=conary.rpath.com@rpl:1/7.15.3-1.3-1 curl=conary.rpath.com@rpl:2/7.17.0-2.1-1 rPath Issue Tracking System: https://issues.rpath.com/browse/RPL-2983 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037 http://curl.haxx.se/docs/adv_20090303.html Description: Previous versions of curl accept arbitrary location values for redirects when CURLOPT_FOLLOWLOCATION is enabled. This may allow remote HTTP servers to trigger arbitrary requests to intranet servers, read or overwrite arbitrary local files, or execute arbitrary commands. This update prohibits these redirects. http://wiki.rpath.com/Advisories:rPSA-2009-0042 Copyright 2009 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html