Vulnerability CVE-2005-0490


Published: 2005-05-02   Modified: 2012-02-12

Description:
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Libcurl -> Libcurl 
CURL -> CURL 

 References:
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940
http://marc.info/?l=full-disclosure&m=110959085507755&w=2
http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml
http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities
http://www.mandriva.com/security/advisories?name=MDKSA-2005:048
http://www.novell.com/linux/security/advisories/2005_11_curl.html
http://www.redhat.com/support/errata/RHSA-2005-340.html
http://www.securityfocus.com/bid/12615
http://www.securityfocus.com/bid/12616
https://exchange.xforce.ibmcloud.com/vulnerabilities/19423
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273

Copyright 2024, cxsecurity.com

 

Back to Top