Project curl Security Advisory, February 6th 2019 -Permalink
libcurl contains a heap buffer out-of-bounds read flaw.
The function handling incoming NTLM type-2 messages(lib/vauth/ntlm.c:ntlm_decode_type2_target
) does notvalidate incoming data correctly and is subject to an integer overflowvulnerability.
Using that overflow, a malicious or broken NTLM server could tricklibcurl to accept a bad length + offset combination that would lead to abuffer read out-of-bounds.
The Common Vulnerabilities and Exposures (CVE) project has assignedthe name CVE-2018-16890 to this issue.
CWE-125: Out-of-bounds Read
Severity: Medium
libcurl is used by many applications, but not always advertised assuch.
We suggest you take one of the following actions immediately, inorder of preference:
A - Upgrade curl to version7.64.0
B - Apply the patch to your version and rebuild
C - Turn off NTLM authentication
It was reported to the curl project on December 30, 2018. Wecontacted distros@openwall on January 28.
curl7.64.0 was released on February 6 2019, coordinated with thepublication of this advisory.
Thanks a lot!