libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target
) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libcurl3": "7.47.0-1ubuntu2.12", "libcurl4-gnutls-dev": "7.47.0-1ubuntu2.12", "libcurl3-dbgsym": "7.47.0-1ubuntu2.12", "libcurl3-nss": "7.47.0-1ubuntu2.12", "libcurl4-doc": "7.47.0-1ubuntu2.12", "libcurl3-gnutls-dbgsym": "7.47.0-1ubuntu2.12", "libcurl4-openssl-dev": "7.47.0-1ubuntu2.12", "libcurl4-openssl-dev-dbgsym": "7.47.0-1ubuntu2.12", "curl-dbgsym": "7.47.0-1ubuntu2.12", "curl": "7.47.0-1ubuntu2.12", "libcurl4-nss-dev-dbgsym": "7.47.0-1ubuntu2.12", "libcurl3-gnutls": "7.47.0-1ubuntu2.12", "libcurl4-gnutls-dev-dbgsym": "7.47.0-1ubuntu2.12", "libcurl3-nss-dbgsym": "7.47.0-1ubuntu2.12", "libcurl3-dbg": "7.47.0-1ubuntu2.12", "libcurl4-nss-dev": "7.47.0-1ubuntu2.12" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "curl-dbgsym": "7.58.0-2ubuntu3.6", "curl": "7.58.0-2ubuntu3.6", "libcurl4": "7.58.0-2ubuntu3.6", "libcurl4-gnutls-dev": "7.58.0-2ubuntu3.6", "libcurl4-dbgsym": "7.58.0-2ubuntu3.6", "libcurl3-nss": "7.58.0-2ubuntu3.6", "libcurl4-doc": "7.58.0-2ubuntu3.6", "libcurl3-nss-dbgsym": "7.58.0-2ubuntu3.6", "libcurl3-gnutls": "7.58.0-2ubuntu3.6", "libcurl3-gnutls-dbgsym": "7.58.0-2ubuntu3.6", "libcurl4-openssl-dev": "7.58.0-2ubuntu3.6", "libcurl4-nss-dev": "7.58.0-2ubuntu3.6" } ] }