Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m8c7-4hj3-f3m6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

EPSS

Процентиль: 88%
0.03934
Низкий

Дефекты

CWE-120
CWE-125
CWE-787

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 8.1
redhat
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
nvd
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.8
debian
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequ ...

EPSS

Процентиль: 88%
0.03934
Низкий

Дефекты

CWE-120
CWE-125
CWE-787