Описание
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
Ссылки
- ExploitPatchThird Party Advisory
- ExploitThird Party Advisory
- Product
- ExploitPatchThird Party Advisory
- ExploitThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.6 (включая)
cpe:2.3:a:libesmtp_project:libesmtp:*:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.0029
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-125
Связанные уязвимости
CVSS3: 9.8
ubuntu
около 6 лет назад
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
CVSS3: 7.4
redhat
около 6 лет назад
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
CVSS3: 9.8
debian
около 6 лет назад
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buf ...
EPSS
Процентиль: 52%
0.0029
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-125