Описание
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.4-8ubuntu0.1 |
| devel | not-affected | 1.6-1 |
| disco | ignored | end of life |
| eoan | ignored | end of life |
| esm-apps/bionic | released | 1.4-8ubuntu0.1 |
| esm-apps/focal | released | 1.5-2ubuntu0.1 |
| esm-apps/jammy | not-affected | 1.6-1 |
| esm-apps/xenial | released | 1.4-7ubuntu0.1~esm1 |
| esm-infra-legacy/trusty | released | 1.4-1ubuntu0.1~esm1 |
| focal | released | 1.5-2ubuntu0.1 |
Показывать по
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequ ...
EPSS
7.5 High
CVSS2
9.8 Critical
CVSS3