Vulnerability Name: | CVE-2005-0490 (CCN-19421) | ||||||||||||
Assigned: | 2005-02-21 | ||||||||||||
Published: | 2005-02-21 | ||||||||||||
Updated: | 2017-10-11 | ||||||||||||
Summary: | Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. | ||||||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: cURL Web page cURL and libcurl Source: MITRE Type: CNA CVE-2005-0490 Source: CONECTIVA Type: Patch, Vendor Advisory CLA-2005:940 Source: FULLDISC Type: UNKNOWN 20050228 [USN-86-1] cURL vulnerability Source: CCN Type: RHSA-2005-340 curl security update Source: CCN Type: CIAC INFORMATION BULLETIN P-167 cURL Security Update Source: CCN Type: GLSA-200503-20 curl: NTLM response buffer overflow Source: GENTOO Type: Patch, Vendor Advisory GLSA-200503-20 Source: IDEFENSE Type: Vendor Advisory 20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability Source: CCN Type: iDEFENSE Security Advisory 02.21.05 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Source: IDEFENSE Type: Vendor Advisory 20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability Source: MANDRAKE Type: UNKNOWN MDKSA-2005:048 Source: SUSE Type: UNKNOWN SUSE-SA:2005:011 Source: REDHAT Type: UNKNOWN RHSA-2005:340 Source: BID Type: UNKNOWN 12615 Source: CCN Type: BID-12615 cURL / libcURL NTLM Authentication Buffer Overflow Vulnerability Source: BID Type: UNKNOWN 12616 Source: CCN Type: BID-12616 cURL / libcURL Kerberos Authentication Buffer Overflow Vulnerability Source: CCN Type: TLSA-2005-42 Buffer overflow vulnerabilities exist in curl Source: CCN Type: USN-86-1 cURL vulnerability Source: XF Type: UNKNOWN curl-ntlm-bo(19421) Source: XF Type: UNKNOWN curl-kerberos-bo(19423) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10273 Source: SUSE Type: SUSE-SA:2005:011 curl: buffer overflow in NTLM authentication | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Vulnerability Name: | CVE-2005-0490 (CCN-19423) | ||||||||||||
Assigned: | 2005-02-21 | ||||||||||||
Published: | 2005-02-21 | ||||||||||||
Updated: | 2017-10-11 | ||||||||||||
Summary: | Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: cURL Web page cURL and libcurl Source: MITRE Type: CNA CVE-2005-0490 Source: CCN Type: RHSA-2005-340 curl security update Source: CCN Type: CIAC INFORMATION BULLETIN P-167 cURL Security Update Source: CCN Type: GLSA-200503-20 curl: NTLM response buffer overflow Source: CCN Type: iDEFENSE Security Advisory 02.21.05 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Source: CCN Type: BID-12615 cURL / libcURL NTLM Authentication Buffer Overflow Vulnerability Source: CCN Type: BID-12616 cURL / libcURL Kerberos Authentication Buffer Overflow Vulnerability Source: CCN Type: TLSA-2005-42 Buffer overflow vulnerabilities exist in curl Source: CCN Type: USN-86-1 cURL vulnerability Source: XF Type: UNKNOWN curl-kerberos-bo(19423) Source: SUSE Type: SUSE-SA:2005:011 curl: buffer overflow in NTLM authentication | ||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |