The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.
References
Configurations
History
21 Nov 2024, 03:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://security.cucumberlinux.com/security/details.php?id=161 - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/101998 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1039896 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040608 - | |
References | () https://access.redhat.com/errata/RHSA-2018:3558 - | |
References | () https://curl.haxx.se/docs/adv_2017-12e7.html - Mitigation, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201712-04 - Third Party Advisory | |
References | () https://www.debian.org/security/2017/dsa-4051 - Third Party Advisory |
Information
Published : 2017-11-29 18:29
Updated : 2024-11-21 03:34
NVD link : CVE-2017-8816
Mitre link : CVE-2017-8816
CVE.ORG link : CVE-2017-8816
JSON object : View
Products Affected
haxx
- curl
- libcurl
debian
- debian_linux
CWE
CWE-190
Integer Overflow or Wraparound