TROYANOSYVIRUS
Volver a CVEs

CVE-2018-16890

HIGH
7.5

Descripcion

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

Detalles CVE

Puntuacion CVSS v3.17.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/6/2019
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

canonical:ubuntu_linuxdebian:debian_linuxf5:big-ip_access_policy_managerhaxx:libcurlnetapp:clustered_data_ontaporacle:communications_operations_monitororacle:http_serveroracle:secure_global_desktopredhat:enterprise_linuxsiemens:sinema_remote_connect_client

Debilidades (CWE)

CWE-125CWE-125CWE-190

Referencias

https://usn.ubuntu.com/3882-1/(secalert@redhat.com)
http://www.securityfocus.com/bid/106947(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:3701(af854a3a-2127-422b-91ae-364da2661108)
https://curl.haxx.se/docs/CVE-2018-16890.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20190315-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3882-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4386(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.