Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. #151

Open
hucarxiao opened this issue Dec 15, 2023 · 0 comments

Comments

@hucarxiao
Copy link

Version
latest

What is the security issue or vulnerability?
/curl/lib/transfer.c
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

start from 183line :
if(((target_info_offset + target_info_len) > size) ||

Security issue or vulnerability information
description: https://nvd.nist.gov/vuln/detail/CVE-2018-16890

commit:MrE-Fog/curlzzz@b780b30

Could you apply for another new CVE and fix it?

NTLM: fix size check condition for type2 received data
Bug: https://curl.haxx.se/docs/CVE-2018-16890.html
Reported-by: Wenxiang Qian
GHSA-53fg-3j53-939q

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant