Логотип exploitDog
bind:CVE-2018-14618
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-14618

Количество 12

Количество 12

ubuntu логотип

CVE-2018-14618

больше 7 лет назад

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-14618

больше 7 лет назад

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2018-14618

больше 7 лет назад

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-14618

больше 7 лет назад

curl before version 7.61.1 is vulnerable to a buffer overrun in the NT ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2736-1

больше 7 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:2731-1

больше 7 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2717-1

больше 7 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2715-1

больше 7 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:2714-1

больше 7 лет назад

Security update for curl

EPSS: Низкий
github логотип

GHSA-4mp9-8964-jxmg

больше 3 лет назад

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 9.8
EPSS: Низкий
oracle-oval логотип

ELSA-2019-1880

больше 6 лет назад

ELSA-2019-1880: curl security and bug fix update (LOW)

EPSS: Низкий
fstec логотип

BDU:2019-00416

больше 7 лет назад

Уязвимость функции Curl_ntlm_core_mk_nt_hash программного средства для взаимодействия с серверами curl, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-14618

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 7.5
0%
Низкий
больше 7 лет назад
redhat логотип
CVE-2018-14618

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 7.5
0%
Низкий
больше 7 лет назад
nvd логотип
CVE-2018-14618

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 7.5
0%
Низкий
больше 7 лет назад
debian логотип
CVE-2018-14618

curl before version 7.61.1 is vulnerable to a buffer overrun in the NT ...

CVSS3: 7.5
0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2736-1

Security update for curl

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:2731-1

Security update for curl

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2717-1

Security update for curl

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2715-1

Security update for curl

0%
Низкий
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:2714-1

Security update for curl

0%
Низкий
больше 7 лет назад
github логотип
GHSA-4mp9-8964-jxmg

curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)

CVSS3: 9.8
0%
Низкий
больше 3 лет назад
oracle-oval логотип
ELSA-2019-1880

ELSA-2019-1880: curl security and bug fix update (LOW)

больше 6 лет назад
fstec логотип
BDU:2019-00416

Уязвимость функции Curl_ntlm_core_mk_nt_hash программного средства для взаимодействия с серверами curl, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 9.8
0%
Низкий
больше 7 лет назад

Уязвимостей на страницу