Movatterモバイル変換


[0]ホーム

URL:


Docs Overview
Project
Bug BountyBug ReportCode of conductDependenciesDonateFAQFeaturesGovernanceHistoryInstallKnown BugsLogoTODOwebsite Info
Protocols
CA ExtractHTTP cookiesHTTP/3MQTTSSL certsSSL libs comparedURL syntaxWebSocket
Releases
Changelogcurl CVEsRelease TableVersion NumberingVulnerabilities
Tool
Comparison Tablecurl man pageHTTP Scriptingmk-ca-bundleTutorialWhen options were added
Who and Why
CompaniesCopyrightSponsorsThanksThe name
curl /Docs /curl CVEs /NTLM type-2 out-of-bounds buffer read
Related:
Audits
Bug Bounty
Changelog
curl CVEs
JSON metadata
Vulnerability Disclosure
Vulnerabilities Table

CVE-2018-16890

NTLM type-2 out-of-boundsbuffer read

Project curl Security Advisory, February 6th 2019 -Permalink

VULNERABILITY

libcurl contains a heap buffer out-of-bounds read flaw.

The function handling incoming NTLM type-2 messages(lib/vauth/ntlm.c:ntlm_decode_type2_target) does notvalidate incoming data correctly and is subject to an integer overflowvulnerability.

Using that overflow, a malicious or broken NTLM server could tricklibcurl to accept a bad length + offset combination that would lead to abuffer read out-of-bounds.

INFO

The Common Vulnerabilities and Exposures (CVE) project has assignedthe name CVE-2018-16890 to this issue.

CWE-125: Out-of-bounds Read

Severity: Medium

AFFECTED VERSIONS

libcurl is used by many applications, but not always advertised assuch.

SOLUTION

RECOMMENDATIONS

We suggest you take one of the following actions immediately, inorder of preference:

A - Upgrade curl to version7.64.0

B - Apply the patch to your version and rebuild

C - Turn off NTLM authentication

TIMELINE

It was reported to the curl project on December 30, 2018. Wecontacted distros@openwall on January 28.

curl7.64.0 was released on February 6 2019, coordinated with thepublication of this advisory.

CREDITS

Thanks a lot!


[8]ページ先頭

©2009-2025 Movatter.jp