9.8
CVSSv3

CVE-2019-19977

Published: 26/12/2019 Updated: 03/01/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

libESMTP up to and including 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

libesmtp project libesmtp

Vendor Advisories

libESMTP before version 110 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstructc During NTLM authentication, a sufficiently long domain, workstation or user name would overwrite the stack Furthermore, nt_unicode() is called with an incorrect length argument, potentially causing it to read uninitialised me ...