Lucene search

K
f5F5SOL4447
HistoryMay 16, 2007 - 12:00 a.m.

SOL4447 - cURL buffer overflow vulnerability - CAN-2005-0490

2007-05-1600:00:00
support.f5.com
9

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.023 Low

EPSS

Percentile

88.5%

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

Information about this advisory is available at the following location:

<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490&gt;

F5 Networks Product Development tracked this issue as CR46925, CR46931, and CR46932 and it was fixed in BBIG-IP version 9.2.

CPENameOperatorVersion
big-ip ltmle9.1.2

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.023 Low

EPSS

Percentile

88.5%