Rapid7 Vulnerability & Exploit Database

F5 Networks: K4447 (CVE-2005-0490): cURL buffer overflow vulnerability CAN-2005-0490

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

F5 Networks: K4447 (CVE-2005-0490): cURL buffer overflow vulnerability CAN-2005-0490

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
05/02/2005
Created
07/25/2018
Added
02/16/2017
Modified
10/13/2017

Description

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

Solution(s)

  • f5-big-ip-upgrade-latest

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;