Описание
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.4-8ubuntu0.1 |
devel | not-affected | 1.6-1 |
disco | ignored | end of life |
eoan | ignored | end of life |
esm-apps/bionic | released | 1.4-8ubuntu0.1 |
esm-apps/focal | released | 1.5-2ubuntu0.1 |
esm-apps/jammy | not-affected | 1.6-1 |
esm-apps/xenial | released | 1.4-7ubuntu0.1~esm1 |
esm-infra-legacy/trusty | released | 1.4-1ubuntu0.1~esm1 |
focal | released | 1.5-2ubuntu0.1 |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequ ...
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3