The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
References
Link | Resource |
---|---|
http://security.cucumberlinux.com/security/details.php?id=161 | Third Party Advisory |
http://www.securityfocus.com/bid/101998 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039896 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040608 | |
https://access.redhat.com/errata/RHSA-2018:3558 | |
https://curl.haxx.se/docs/adv_2017-12e7.html | Mitigation Vendor Advisory |
https://security.gentoo.org/glsa/201712-04 | Third Party Advisory |
https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-11-29 18:29
Updated : 2018-11-13 11:29
NVD link : CVE-2017-8816
Mitre link : CVE-2017-8816
CVE.ORG link : CVE-2017-8816
JSON object : View
Products Affected
haxx
- libcurl
- curl
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound