Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17266

Опубликовано: 06 окт. 2019
Источник: debian

Описание

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libsoup2.4fixed2.68.2-1package
libsoup2.4not-affectedbusterpackage
libsoup2.4not-affectedstretchpackage
libsoup2.4not-affectedjessiepackage

Примечания

  • https://gitlab.gnome.org/GNOME/libsoup/issues/173 (private)

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 8.2
redhat
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
nvd
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
github
больше 3 лет назад

libsoup through 2.68.1 has a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость функции soup_ntlm_parse_challenge() библиотеки libsoup, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации