Related Vulnerabilities: CVE-2017-8816  

A buffer overrun flaw has been found in libcurl > 7.15.4 and < 7.57.0, in the NTLM authentication code. The internal function `Curl_ntlm_core_mk_ntlmv2_hash` sums up the lengths of the user name + password (= SUM) and multiplies the sum by two (= SIZE) to figure out how large storage to allocate from the heap. The SUM value is subsequently used to iterate over the input and generate output into the storage buffer. On systems with a 32 bit `size_t`, the math to calculate SIZE triggers an integer overflow when the combined lengths of the user name and password is larger than 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a buffer overrun. This is only an issue on 32 bit systems. It also requires the user and password fields to use more than 2GB of memory combined, which in itself should be rare.

Severity High

Remote Yes

Type Arbitrary code execution

Description

A buffer overrun flaw has been found in libcurl > 7.15.4 and < 7.57.0, in the NTLM authentication code. The internal function `Curl_ntlm_core_mk_ntlmv2_hash` sums up the lengths of the user name + password (= SUM) and multiplies the sum by two (= SIZE) to figure out how large storage to allocate from the heap. The SUM value is subsequently used to iterate over the input and generate output into the storage buffer. On systems with a 32 bit `size_t`, the math to calculate SIZE triggers an integer overflow when the combined lengths of the user name and password is larger than 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a buffer overrun. 
This is only an issue on 32 bit systems. It also requires the user and password fields to use more than 2GB of memory combined, which in itself should be rare.

AVG-529 libcurl-gnutls 7.56.1-1 7.57.0-1 High Not affected

AVG-528 libcurl-compat 7.56.1-1 7.57.0-1 High Not affected

AVG-527 curl 7.56.1-1 7.57.0-1 High Not affected

AVG-523 lib32-libcurl-gnutls 7.56.1-1 7.57.0-1 High Fixed

AVG-522 lib32-libcurl-compat 7.56.1-1 7.57.0-1 High Fixed

AVG-521 lib32-curl 7.56.1-1 7.57.0-1 High Fixed

30 Nov 2017 ASA-201711-38 AVG-522 lib32-libcurl-compat High multiple issues

30 Nov 2017 ASA-201711-37 AVG-523 lib32-libcurl-gnutls High multiple issues

30 Nov 2017 ASA-201711-36 AVG-521 lib32-curl High multiple issues

https://curl.haxx.se/docs/adv_2017-11e7.html
https://curl.haxx.se/CVE-2017-8816.patch
https://github.com/curl/curl/commit/7f2a1df6f5fc598750b2c6f34465c8d924db28cc

only affects 32-bit variants
Introduced by: https://github.com/curl/curl/commit/86724581b6c02d160b52f817550cfdfc9c93af62