The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
References
Link | Resource |
---|---|
http://security.cucumberlinux.com/security/details.php?id=161 | Third Party Advisory |
http://www.securityfocus.com/bid/101998 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1039896 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040608 | |
https://access.redhat.com/errata/RHSA-2018:3558 | |
https://curl.haxx.se/docs/adv_2017-12e7.html | Mitigation Vendor Advisory |
https://security.gentoo.org/glsa/201712-04 | Third Party Advisory |
https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: debian
Published: 2017-11-29T18:00:00
Updated: 2018-11-13T10:57:01
Reserved: 2017-05-07T00:00:00
Link: CVE-2017-8816
JSON object: View
NVD Information
Status : Modified
Published: 2017-11-29T18:29:00.300
Modified: 2018-11-13T11:29:22.307
Link: CVE-2017-8816
JSON object: View
Redhat Information
No data.
CWE