Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17455

Опубликовано: 10 окт. 2019
Источник: debian
EPSS Низкий

Описание

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libntlmfixed1.6-1package
libntlmfixed1.5-1+deb10u1busterpackage

Примечания

  • https://gitlab.com/jas/libntlm/issues/2

  • https://gitlab.com/jas/libntlm/-/commit/b967886873fcf19f816b9c0868465f2d9e5df85e

EPSS

Процентиль: 91%
0.07078
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 8.1
redhat
больше 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
nvd
больше 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
msrc
почти 4 года назад

Описание отсутствует

suse-cvrf
больше 5 лет назад

Security update for libntlm

EPSS

Процентиль: 91%
0.07078
Низкий