Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wcxh-xxc8-v5j8

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

libsoup through 2.68.1 has a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

libsoup through 2.68.1 has a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

EPSS

Процентиль: 76%
0.00942
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-125

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 8.2
redhat
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
nvd
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
debian
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer ove ...

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость функции soup_ntlm_parse_challenge() библиотеки libsoup, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации

EPSS

Процентиль: 76%
0.00942
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-125