Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-17266

Опубликовано: 06 окт. 2019
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

РелизСтатусПримечание
bionic

released

2.62.1-1ubuntu0.4
devel

released

2.68.2-0ubuntu1
disco

released

2.66.1-1ubuntu0.1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2.62.1-1ubuntu0.4
esm-infra/xenial

not-affected

code not present
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

upstream

released

2.68.2

Показывать по

EPSS

Процентиль: 76%
0.00942
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.2
redhat
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
nvd
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
debian
больше 6 лет назад

libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer ove ...

CVSS3: 9.8
github
больше 3 лет назад

libsoup through 2.68.1 has a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость функции soup_ntlm_parse_challenge() библиотеки libsoup, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации

EPSS

Процентиль: 76%
0.00942
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3