Логотип exploitDog
bind:CVE-2018-16890
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16890

Количество 14

Количество 14

ubuntu логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-53fg-3j53-939q

около 3 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-01750

больше 6 лет назад

Уязвимость функции ntlm_decode_type2_target библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-00964

больше 6 лет назад

Уязвимость функции NTLM type-2 библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:0174-1

около 6 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:0173-1

больше 6 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0249-2

около 6 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0249-1

больше 6 лет назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0248-1

больше 6 лет назад

Security update for curl

EPSS: Низкий
oracle-oval логотип

ELSA-2019-3701

больше 5 лет назад

ELSA-2019-3701: curl security and bug fix update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0339-1

больше 6 лет назад

Security update for curl

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 4.3
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap ...

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
github логотип
GHSA-53fg-3j53-939q

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-01750

Уязвимость функции ntlm_decode_type2_target библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
fstec логотип
BDU:2019-00964

Уязвимость функции NTLM type-2 библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0174-1

Security update for curl

около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0173-1

Security update for curl

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0249-2

Security update for curl

около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0249-1

Security update for curl

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0248-1

Security update for curl

больше 6 лет назад
oracle-oval логотип
ELSA-2019-3701

ELSA-2019-3701: curl security and bug fix update (MODERATE)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:0339-1

Security update for curl

больше 6 лет назад

Уязвимостей на страницу