Количество 9
Количество 9
CVE-2019-17455
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
CVE-2019-17455
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
CVE-2019-17455
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
CVE-2019-17455
CVE-2019-17455
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequ ...
openSUSE-SU-2020:0806-1
Security update for libntlm
GHSA-m8c7-4hj3-f3m6
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
BDU:2021-05383
Уязвимость библиотеки libntlm реализации протокола сетевой аутентификации NT LAN Manager (NTLM), позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
ROS-20250624-16
Уязвимость libntlm
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-17455 Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request. | CVSS3: 9.8 | 7% Низкий | больше 6 лет назад | |
CVE-2019-17455 Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request. | CVSS3: 8.1 | 7% Низкий | больше 6 лет назад | |
CVE-2019-17455 Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request. | CVSS3: 9.8 | 7% Низкий | больше 6 лет назад | |
CVSS3: 9.8 | 7% Низкий | почти 4 года назад | ||
CVE-2019-17455 Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequ ... | CVSS3: 9.8 | 7% Низкий | больше 6 лет назад | |
openSUSE-SU-2020:0806-1 Security update for libntlm | 7% Низкий | больше 5 лет назад | ||
GHSA-m8c7-4hj3-f3m6 Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request. | 7% Низкий | больше 3 лет назад | ||
BDU:2021-05383 Уязвимость библиотеки libntlm реализации протокола сетевой аутентификации NT LAN Manager (NTLM), позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании | CVSS3: 9.8 | 7% Низкий | больше 6 лет назад | |
ROS-20250624-16 Уязвимость libntlm | CVSS3: 9.8 | 7% Низкий | 7 месяцев назад |
Уязвимостей на страницу