Lucene search

K
f5F5SOL4447
HistoryMay 16, 2007 - 12:00 a.m.

SOL4447 - cURL buffer overflow vulnerability - CAN-2005-0490

2007-05-1600:00:00
support.f5.com
13

0.007 Low

EPSS

Percentile

80.4%

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

Information about this advisory is available at the following location:

<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490&gt;

F5 Networks Product Development tracked this issue as CR46925, CR46931, and CR46932 and it was fixed in BBIG-IP version 9.2.

CPENameOperatorVersion
big-ip ltmle9.1.2