Movatterモバイル変換


[0]ホーム

URL:


Docs Overview
Project
Bug BountyBug ReportCode of conductDependenciesDonateFAQFeaturesGovernanceHistoryInstallKnown BugsLogoTODOwebsite Info
Protocols
CA ExtractHTTP cookiesHTTP/3MQTTSSL certsSSL libs comparedURL syntaxWebSocket
Releases
Changelogcurl CVEsRelease TableVersion NumberingVulnerabilities
Tool
Comparison Tablecurl man pageHTTP Scriptingmk-ca-bundleTutorialWhen options were added
Who and Why
CompaniesCopyrightSponsorsThanksThe name
curl /Docs /curl CVEs /NTLM password overflow via integer overflow
Related:
Audits
Bug Bounty
Changelog
curl CVEs
JSON metadata
Vulnerability Disclosure
Vulnerabilities Table

CVE-2018-14618

NTLM passwordoverflow via integer overflow

Project curl Security Advisory, September 5th 2018 -Permalink

VULNERABILITY

libcurl contains a buffer overrun in the NTLM authenticationcode.

The internal functionCurl_ntlm_core_mk_nt_hashmultiplies thelength of the password by two (SUM) tofigure out how large temporary storage area to allocate from theheap.

Thelength value is then subsequently used to iterateover the password and generate output into the allocated storage buffer.On systems with a 32 bitsize_t, the math to calculate SUMtriggers an integer overflow when the password length exceeds 2GB (2^31bytes). This integer overflow usually causes a very small buffer toactually get allocated instead of the intended very huge one, making theuse of that buffer end up in a heap buffer overflow.

(This bug is almost identical toCVE-2017-8816.)

INFO

The Common Vulnerabilities and Exposures (CVE) project has assignedthe name CVE-2018-14618 to this issue.

CWE-131: Incorrect Calculation of Buffer Size

Severity: High

AFFECTED VERSIONS

This issue is only present on 32 bit systems. It also requires thepassword field to use more than 2GB of memory, which should be rare.

curl is used by many applications, but not always advertised assuch.

SOLUTION

In libcurl version7.61.1, the integer overflow is avoided.

RECOMMENDATIONS

We suggest you take one of the following actions immediately, inorder of preference:

A - Upgrade curl to version7.61.1

B - Apply the patch to your version and rebuild

C - Put length restrictions on the password you can pass tolibcurl

TIMELINE

It waspubliclyreported to the curl project on July 18, 2018. We contacteddistros@openwall on August 27.

curl7.61.1 was released on September 5 2018, coordinated with thepublication of this advisory.

CREDITS

Thanks a lot!


[8]ページ先頭

©2009-2025 Movatter.jp