Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt - | |
References | () http://docs.info.apple.com/article.html?artnum=302847 - | |
References | () http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html - | |
References | () http://secunia.com/advisories/17192 - Vendor Advisory | |
References | () http://secunia.com/advisories/17193 - Vendor Advisory | |
References | () http://secunia.com/advisories/17203 - Vendor Advisory | |
References | () http://secunia.com/advisories/17208 - Vendor Advisory | |
References | () http://secunia.com/advisories/17228 - Vendor Advisory | |
References | () http://secunia.com/advisories/17247 - Vendor Advisory | |
References | () http://secunia.com/advisories/17297 - Vendor Advisory | |
References | () http://secunia.com/advisories/17320 - Vendor Advisory | |
References | () http://secunia.com/advisories/17400 - Vendor Advisory | |
References | () http://secunia.com/advisories/17403 - Vendor Advisory | |
References | () http://secunia.com/advisories/17485 - Vendor Advisory | |
References | () http://secunia.com/advisories/17813 - Vendor Advisory | |
References | () http://secunia.com/advisories/17965 - Vendor Advisory | |
References | () http://secunia.com/advisories/19193 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/82 - | |
References | () http://securitytracker.com/id?1015056 - | |
References | () http://securitytracker.com/id?1015057 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010 - | |
References | () http://www.debian.org/security/2005/dsa-919 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml - | |
References | () http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:182 - | |
References | () http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html - | |
References | () http://www.osvdb.org/20011 - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-807.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-812.html - | |
References | () http://www.securityfocus.com/bid/15102 - | |
References | () http://www.securityfocus.com/bid/15647 - | |
References | () http://www.vupen.com/english/advisories/2005/2088 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2005/2125 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2005/2659 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22721 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810 - | |
References | () https://usn.ubuntu.com/205-1/ - |
Information
Published : 2005-10-13 22:02
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3185
Mitre link : CVE-2005-3185
CVE.ORG link : CVE-2005-3185
JSON object : View
Products Affected
curl
- curl
libcurl
- libcurl
wget
- wget
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer