Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-16890
HistoryFeb 06, 2019 - 12:00 a.m.

CVE-2018-16890

2019-02-0600:00:00
ubuntu.com
ubuntu.com
16

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.049

Percentile

92.9%

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap
buffer out-of-bounds read. The function handling incoming NTLM type-2
messages (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate
incoming data correctly and is subject to an integer overflow
vulnerability. Using that overflow, a malicious or broken NTLM server could
trick libcurl to accept a bad length + offset combination that would lead
to a buffer read out-of-bounds.

Notes

Author Note
mdeslaur affects libcurl 7.36.0 to and including 7.63.0
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcurl< 7.58.0-2ubuntu3.6UNKNOWN
ubuntu18.10noarchcurl< 7.61.0-1ubuntu2.3UNKNOWN
ubuntu16.04noarchcurl< 7.47.0-1ubuntu2.12UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.049

Percentile

92.9%