libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
],
"vendor_product": "canonical:ubuntu_linux",
"extracted_events": [
{
"last_affected": "14.04"
},
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "18.10"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"vendor_product": "debian:debian_linux",
"extracted_events": [
{
"last_affected": "9.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"
],
"vendor_product": "f5:big-ip_access_policy_manager",
"extracted_events": [
{
"introduced": "13.1.0"
},
{
"last_affected": "13.1.3"
},
{
"introduced": "14.0.0"
},
{
"last_affected": "14.1.2"
},
{
"introduced": "15.0.0"
},
{
"last_affected": "15.0.1"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:communications_operations_monitor",
"extracted_events": [
{
"last_affected": "3.4"
},
{
"last_affected": "4.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:http_server",
"extracted_events": [
{
"last_affected": "12.2.1.3.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"
],
"vendor_product": "oracle:secure_global_desktop",
"extracted_events": [
{
"last_affected": "5.4"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
],
"vendor_product": "redhat:enterprise_linux",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"
],
"vendor_product": "siemens:sinema_remote_connect_client",
"extracted_events": [
{
"last_affected": "2.0"
}
]
}
]
}