Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17455

Опубликовано: 10 окт. 2019
Источник: debian
EPSS Низкий

Описание

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libntlmfixed1.6-1package
libntlmfixed1.5-1+deb10u1busterpackage

Примечания

  • https://gitlab.com/jas/libntlm/issues/2

  • https://gitlab.com/jas/libntlm/-/commit/b967886873fcf19f816b9c0868465f2d9e5df85e

EPSS

Процентиль: 88%
0.03934
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 8.1
redhat
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
nvd
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
msrc
больше 3 лет назад

Описание отсутствует

suse-cvrf
около 5 лет назад

Security update for libntlm

EPSS

Процентиль: 88%
0.03934
Низкий