8.8
CVSSv3

CVE-2005-0490

Published: 02/05/2005 Updated: 02/02/2024
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

Vulnerable Product Search on Vulmon Subscribe to Product

haxx curl 7.12.1

haxx libcurl 7.12.1

Vendor Advisories

Synopsis curl security update Type/Severity Security Advisory: Low Topic Updated curl packages are now availableThis update has been rated as having low security impact by theRed Hat Security Response Team Description cURL is a tool for getting files from FTP, HTTP, Gopher, Telnet, andDic ...
infamous41md discovered a buffer overflow in cURL’s NT LAN Manager (NTLM) authentication handling By sending a specially crafted long NTLM reply packet, a remote attacker could overflow the reply buffer This could lead to execution of arbitrary attacker specified code with the privileges of the application using the cURL library ...