Lucene search

K
nvd[email protected]NVD:CVE-2005-3185
HistoryOct 13, 2005 - 10:02 p.m.

CVE-2005-3185

2005-10-1322:02:00
CWE-119
web.nvd.nist.gov
1

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

Low

0.023 Low

EPSS

Percentile

89.7%

Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.

Affected configurations

NVD
Node
curlcurlMatch7.13.2
OR
libcurllibcurlMatch7.13.2
OR
wgetwgetMatch1.10

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.8 High

AI Score

Confidence

Low

0.023 Low

EPSS

Percentile

89.7%