Vulnerability Name: | CVE-2005-3185 (CCN-22721) | ||||||||||||||||||||||||
Assigned: | 2005-10-12 | ||||||||||||||||||||||||
Published: | 2005-10-12 | ||||||||||||||||||||||||
Updated: | 2018-10-03 | ||||||||||||||||||||||||
Summary: | Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username. | ||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: SCO Type: UNKNOWN SCOSA-2006.10 Source: CCN Type: cURL Web site cURL and libcurl Source: CCN Type: Project cURL Security Advisory, October 13th 2005 libcurl NTLM Buffer Overflow Vulnerability Source: MITRE Type: CNA CVE-2005-3185 Source: APPLE Type: UNKNOWN APPLE-SA-2005-11-29 Source: CCN Type: wget Download Web page Index of /pub/gnu/wget Source: TRUSTIX Type: UNKNOWN TSLSA-2005-0059 Source: CCN Type: RHSA-2005-807 curl security update Source: CCN Type: RHSA-2005-812 wget security update Source: CCN Type: SA17192 wget NTLM Username Handling Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 17192 Source: CCN Type: SA17193 cURL/libcURL NTLM Username Handling Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 17193 Source: SECUNIA Type: Vendor Advisory 17203 Source: SECUNIA Type: Vendor Advisory 17208 Source: SECUNIA Type: Vendor Advisory 17228 Source: SECUNIA Type: Vendor Advisory 17247 Source: SECUNIA Type: Vendor Advisory 17297 Source: SECUNIA Type: Vendor Advisory 17320 Source: SECUNIA Type: Vendor Advisory 17400 Source: SECUNIA Type: Vendor Advisory 17403 Source: SECUNIA Type: Vendor Advisory 17485 Source: CCN Type: SA17813 Mac OS X Security Update Fixes Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 17813 Source: SECUNIA Type: Vendor Advisory 17965 Source: SECUNIA Type: Vendor Advisory 19193 Source: SREASON Type: UNKNOWN 82 Source: CCN Type: SECTRACK ID: 1015056 wget Buffer Overflow in Processing NTLM Authentication Values May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015056 Source: CCN Type: SECTRACK ID: 1015057 cURL/libcurl Buffer Overflow in Processing NTLM Authentication Values May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015057 Source: SLACKWARE Type: UNKNOWN SSA:2005-310-01 Source: CCN Type: ASA-2006-027 curl security update (RHSA-2005-807) Source: DEBIAN Type: UNKNOWN DSA-919 Source: DEBIAN Type: DSA-919 curl -- buffer overflow Source: CCN Type: GLSA-200510-19 cURL: NTLM username stack overflow Source: GENTOO Type: UNKNOWN GLSA-200510-19 Source: IDEFENSE Type: Patch, Vendor Advisory 20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability Source: CCN Type: iDEFENSE Security Advisory 10.13.05 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability Source: MANDRIVA Type: UNKNOWN MDKSA-2005:182 Source: SUSE Type: UNKNOWN SUSE-SA:2005:063 Source: OSVDB Type: UNKNOWN 20011 Source: CCN Type: OSVDB ID: 20011 GNU wget NTLM Username ntlm_output() Function Overflow Source: FEDORA Type: UNKNOWN FEDORA-2005-1129 Source: FEDORA Type: UNKNOWN FEDORA-2005-1000 Source: REDHAT Type: UNKNOWN RHSA-2005:807 Source: REDHAT Type: UNKNOWN RHSA-2005:812 Source: BID Type: UNKNOWN 15102 Source: CCN Type: BID-15102 Multiple Vendor WGet/Curl NTLM Username Buffer Overflow Vulnerability Source: BID Type: UNKNOWN 15647 Source: CCN Type: BID-15647 RETIRED: Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities Source: CCN Type: USN-205-1 Curl and wget vulnerabilities Source: VUPEN Type: Vendor Advisory ADV-2005-2088 Source: VUPEN Type: Vendor Advisory ADV-2005-2125 Source: VUPEN Type: Vendor Advisory ADV-2005-2659 Source: XF Type: UNKNOWN wget-curl-ntlm-username-bo(22721) Source: XF Type: UNKNOWN wget-curl-ntlm-username-bo(22721) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9810 Source: UBUNTU Type: UNKNOWN USN-205-1 Source: SUSE Type: SUSE-SA:2005:063 wget curl: remote code execution Source: SUSE Type: SUSE-SR:2005:025 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |