ID CVE-2005-0490
Summary Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
References
Vulnerable Configurations
  • cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
oval via4
accepted 2013-04-29T04:04:13.466-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
description Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
family unix
id oval:org.mitre.oval:def:10273
status accepted
submitted 2010-07-09T03:56:16-04:00
title Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
version 23
redhat via4
advisories
rhsa
id RHSA-2005:340
refmap via4
bid
  • 12615
  • 12616
conectiva CLA-2005:940
fulldisc 20050228 [USN-86-1] cURL vulnerability
gentoo GLSA-200503-20
idefense
  • 20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability
  • 20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability
mandrake MDKSA-2005:048
suse SUSE-SA:2005:011
xf curl-kerberos-bo(19423)
Last major update 11-10-2017 - 01:29
Published 02-05-2005 - 04:00
Back to Top