The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libcurl3": "7.47.0-1ubuntu2.5", "libcurl4-gnutls-dev": "7.47.0-1ubuntu2.5", "libcurl3-dbgsym": "7.47.0-1ubuntu2.5", "libcurl3-nss": "7.47.0-1ubuntu2.5", "libcurl4-doc": "7.47.0-1ubuntu2.5", "libcurl3-gnutls-dbgsym": "7.47.0-1ubuntu2.5", "libcurl4-openssl-dev": "7.47.0-1ubuntu2.5", "libcurl4-openssl-dev-dbgsym": "7.47.0-1ubuntu2.5", "curl-dbgsym": "7.47.0-1ubuntu2.5", "curl": "7.47.0-1ubuntu2.5", "libcurl4-nss-dev-dbgsym": "7.47.0-1ubuntu2.5", "libcurl3-gnutls": "7.47.0-1ubuntu2.5", "libcurl4-gnutls-dev-dbgsym": "7.47.0-1ubuntu2.5", "libcurl3-nss-dbgsym": "7.47.0-1ubuntu2.5", "libcurl3-dbg": "7.47.0-1ubuntu2.5", "libcurl4-nss-dev": "7.47.0-1ubuntu2.5" } ] }