9.8
CVSSv3

CVE-2019-3822

Published: 06/02/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

libcurl versions from 7.36.0 to prior to 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

haxx libcurl

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 18.10

debian debian linux 9.0

netapp snapcenter -

netapp oncommand workflow automation -

netapp oncommand insight -

netapp active iq unified manager

netapp clustered data ontap

siemens sinema remote connect client

oracle http server 12.2.1.3.0

oracle enterprise manager ops center 12.3.3

oracle secure global desktop 5.4

oracle communications operations monitor 3.4

oracle communications operations monitor 4.0

oracle enterprise manager ops center 12.4.0

oracle services tools bundle 19.2

oracle mysql server

redhat enterprise linux 8.0

Vendor Advisories

Several security issues were fixed in curl ...
Synopsis Moderate: curl security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for curl is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring System (CVSS) base sco ...
Synopsis Moderate: OpenShift Container Platform 461 image security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 46Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability S ...
A stack-based buffer overflow vulnerability in the 'Server: Packaging (cURL)' subcomponent could allow an unauthenticated attacker to gain complete control of an affected instance of MySQL Server (CVE-2019-3822) Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML) Supported versions that are affected are 5644 ...
libcurl is vulnerable to a heap buffer out-of-bounds read The function handling incoming NTLM type-2 messages (`lib/vauth/ntlmc:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length ...
Impact: Moderate Public Date: 2019-02-06 CWE: CWE-121 Bugzilla: 1670254: CVE-2019-3822 curl: NTLMv2 typ ...
libcurl versions from 7360 to before 7640 are vulnerable to a stack-based buffer overflow The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlmc:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data The check that exists to prevent the local buffer from getting o ...

Github Repositories

Building a Secure, Automated Supply Chain - Dockercon 2019 Who am i Github : githubcom/clemenko Twitter : @clemenko Email : clemenko@dockercom In this lab you will integrate Docker Enterprise in to your development pipeline You will push an image to the Docker Trusted Registry (DTR) DTR will scan your image for vulnerabilities so they can be fixed before your app

Fed Summit Workshop for Building a Secure Supply Chain

Building a Secure, Automated Supply Chain - Mid Atlantic Summit 2019 In this lab you will integrate Docker Enterprise in to your development pipeline You will push an image to the Docker Trusted Registry (DTR) DTR will scan your image for vulnerabilities so they can be fixed before your application is deployed This helps you build more secure apps! Difficulty: Beginner Time

Building a Secure, Automated Supply Chain - Dockercon 2019 Who am i Github : githubcom/clemenko Twitter : @clemenko Email : clemenko@gmailcom In this lab you will integrate Docker Enterprise in to your development pipeline You will push an image to the Docker Trusted Registry (DTR) DTR will scan your image for vulnerabilities so they can be fixed before your appl