The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
References
Link | Resource |
---|---|
https://curl.haxx.se/docs/adv_2017-12e7.html | Mitigation Vendor Advisory |
https://www.debian.org/security/2017/dsa-4051 | Third Party Advisory |
http://www.securitytracker.com/id/1039896 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/101998 | Third Party Advisory VDB Entry |
http://security.cucumberlinux.com/security/details.php?id=161 | Third Party Advisory |
https://security.gentoo.org/glsa/201712-04 | Third Party Advisory |
http://www.securitytracker.com/id/1040608 | |
https://access.redhat.com/errata/RHSA-2018:3558 |
Information
Published : 2017-11-29 10:29
Updated : 2018-11-13 03:29
NVD link : CVE-2017-8816
Mitre link : CVE-2017-8816
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
debian
- debian_linux
haxx
- curl
- libcurl