Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-17455

Опубликовано: 08 окт. 2019
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

A flaw was found in the libntlm NTLM library where it was vulnerable to a buffer overflow in the buildSmbNtlmAuthRequest_userlen() function. If an application using this library does not check input length before calling the function, an attacker could use this flaw to send a specially crafted request that could crash the application, or possibly trigger code execution.

Отчет

The vulnerability is rated Medium because no package in Red Hat Enterprise Linux versions 6 and 7 is using Libntlm. Most 3rd party applications using Libntlm are command line clients and would be affected via a command line option or a configuration file, which are local vectors.

Меры по смягчению последствий

The calling application must verify that the input username and domain fit in the 1024 byte buffer.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libntlmWill not fix
Red Hat Enterprise Linux 7libntlmAffected
Red Hat Satellite 5libntlmOut of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119->CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1768463libntlm: stack-based buffer overflow in buildSmbNtlmAuthRequest in smbutil.c

EPSS

Процентиль: 88%
0.03934
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
nvd
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS3: 9.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 9.8
debian
почти 6 лет назад

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequ ...

suse-cvrf
около 5 лет назад

Security update for libntlm

EPSS

Процентиль: 88%
0.03934
Низкий

8.1 High

CVSS3