[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2019-17455 -- libntlm

ID: oval:org.secpod.oval:def:2004917Date: (C)2020-10-22   (M)2023-11-13
Class: VULNERABILITYFamily: unix




Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

Platform:
Debian 10.x
Debian 9.x
Product:
libntlm0-dev
Reference:
CVE-2019-17455
CVE    1
CVE-2019-17455
CPE    5
cpe:/o:debian:debian_linux:10.x
cpe:/o:debian:debian_linux:9.0
cpe:/o:debian:debian_linux:9.x
cpe:/a:nongnu:libntlm0-dev
...

© SecPod Technologies