Rapid7 Vulnerability & Exploit Database

SUSE-SA:2005:011: curl buffer overflow in NTLM authentication

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

SUSE-SA:2005:011: curl buffer overflow in NTLM authentication

Severity
5
CVSS
(AV:N/AC:H/Au:N/C:P/I:P/A:P)
Published
02/28/2005
Created
07/25/2018
Added
11/08/2005
Modified
11/18/2015

Description

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;