Описание
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | libsoup | Not affected | ||
| Red Hat Enterprise Linux 6 | libsoup | Not affected | ||
| Red Hat Enterprise Linux 7 | libsoup | Not affected | ||
| Red Hat Enterprise Linux 8 | libsoup | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
8.2 High
CVSS3
Связанные уязвимости
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer ove ...
libsoup through 2.68.1 has a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
Уязвимость функции soup_ntlm_parse_challenge() библиотеки libsoup, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации
EPSS
8.2 High
CVSS3