Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0490

Опубликовано: 02 мая 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 5.1
CVSS3: 8.8

Описание

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

РелизСтатусПримечание
dapper

released

7.15.1-1ubuntu2.1
devel

released

7.16.4-2ubuntu1
edgy

released

7.15.4-1ubuntu2.2
feisty

released

7.15.5-1ubuntu2.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 85%
0.02576
Низкий

5.1 Medium

CVSS2

8.8 High

CVSS3

Связанные уязвимости

redhat
больше 20 лет назад

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

CVSS3: 8.8
nvd
больше 20 лет назад

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

CVSS3: 8.8
debian
больше 20 лет назад

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and ...

CVSS3: 8.8
github
больше 3 лет назад

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

EPSS

Процентиль: 85%
0.02576
Низкий

5.1 Medium

CVSS2

8.8 High

CVSS3