Количество 14
Количество 14

CVE-2018-16890
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVE-2018-16890
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVE-2018-16890
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
CVE-2018-16890
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap ...
GHSA-53fg-3j53-939q
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

BDU:2019-01750
Уязвимость функции ntlm_decode_type2_target библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

BDU:2019-00964
Уязвимость функции NTLM type-2 библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

openSUSE-SU-2019:0174-1
Security update for curl

openSUSE-SU-2019:0173-1
Security update for curl

SUSE-SU-2019:0249-2
Security update for curl

SUSE-SU-2019:0249-1
Security update for curl

SUSE-SU-2019:0248-1
Security update for curl
ELSA-2019-3701
ELSA-2019-3701: curl security and bug fix update (MODERATE)

SUSE-SU-2019:0339-1
Security update for curl
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-16890 libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад |
![]() | CVE-2018-16890 libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. | CVSS3: 4.3 | 1% Низкий | больше 6 лет назад |
![]() | CVE-2018-16890 libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад |
CVE-2018-16890 libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap ... | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад | |
GHSA-53fg-3j53-939q libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. | CVSS3: 7.5 | 1% Низкий | около 3 лет назад | |
![]() | BDU:2019-01750 Уязвимость функции ntlm_decode_type2_target библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад |
![]() | BDU:2019-00964 Уязвимость функции NTLM type-2 библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 1% Низкий | больше 6 лет назад |
![]() | openSUSE-SU-2019:0174-1 Security update for curl | около 6 лет назад | ||
![]() | openSUSE-SU-2019:0173-1 Security update for curl | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0249-2 Security update for curl | около 6 лет назад | ||
![]() | SUSE-SU-2019:0249-1 Security update for curl | больше 6 лет назад | ||
![]() | SUSE-SU-2019:0248-1 Security update for curl | больше 6 лет назад | ||
ELSA-2019-3701 ELSA-2019-3701: curl security and bug fix update (MODERATE) | больше 5 лет назад | |||
![]() | SUSE-SU-2019:0339-1 Security update for curl | больше 6 лет назад |
Уязвимостей на страницу