Total vulnerabilities in the database
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target
) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
Software | From | Fixed in |
---|---|---|
haxx / libcurl | 7.36.0 | 7.64.0 |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 18.10 | 18.10.x |
debian / debian_linux | 9.0 | 9.0.x |
netapp / clustered_data_ontap | - | - |
siemens / sinema_remote_connect_client | - | 2.0.x |
oracle / http_server | 12.2.1.3.0 | 12.2.1.3.0.x |
oracle / secure_global_desktop | 5.4 | 5.4.x |
oracle / communications_operations_monitor | 3.4 | 3.4.x |
oracle / communications_operations_monitor | 4.0 | 4.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
f5 / big-ip_access_policy_manager | 14.0.0 | 14.1.2.x |
f5 / big-ip_access_policy_manager | 15.0.0 | 15.0.1.x |
f5 / big-ip_access_policy_manager | 13.1.0 | 13.1.3.x |