LWN.net has an advisory: "The version of curl as distributed with Debian GNU/Linux 2.2 had a bug
in the error logging code: when it created an error message it failed to
check the size of the buffer allocated for storing the message. This
could be exploited by the remote machine by returning an invalid
response to a request from curl which overflows the error buffer and
trick curl into executing arbitrary code."
October 13, 2000