CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
haxxlibcurl
7.36.0 ≤
𝑥
< 7.64.0
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
canonicalubuntu_linux
18.10
debiandebian_linux
9.0
netappclustered_data_ontap
*
siemenssinema_remote_connect_client
𝑥
≤ 2.0
oraclecommunications_operations_monitor
3.4
oraclecommunications_operations_monitor
4.0
oraclehttp_server
12.2.1.3.0
oraclesecure_global_desktop
5.4
redhatenterprise_linux
8.0
f5big-ip_access_policy_manager
13.1.0 ≤
𝑥
≤ 13.1.3
f5big-ip_access_policy_manager
14.0.0 ≤
𝑥
≤ 14.1.2
f5big-ip_access_policy_manager
15.0.0 ≤
𝑥
≤ 15.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
curl
bullseye
7.74.0-1.3+deb11u13
fixed
bullseye (security)
7.74.0-1.3+deb11u11
fixed
bookworm
7.88.1-10+deb12u7
fixed
bookworm (security)
7.88.1-10+deb12u5
fixed
sid
8.10.1-2
fixed
trixie
8.10.1-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
curl
cosmic
Fixed 7.61.0-1ubuntu2.3
released
bionic
Fixed 7.58.0-2ubuntu3.6
released
xenial
Fixed 7.47.0-1ubuntu2.12
released
trusty
not-affected
References