Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:13442
HistoryMar 12, 2019 - 5:15 a.m.

Remote Code Execution (RCE)

2019-03-1205:15:55
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
7

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

libcurl.so is vulnerable to remote code execution (RCE). An improper bounds check in the function that creates an outgoing NTLM type-3 header (lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()) results in a stack-based buffer overflow when a very large nt response data is extracted from a previous NTLMv2 header, allowing a remote attacker to exploit the vulnerability to execute arbitrary code, or crash the application.

CPENameOperatorVersion
libcurl.soeq4.4.0
curleq7.61.1__8.el8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P