Due to bad usage of the base64 decode function to a stack-based buffer without checking the data length, it was possible for a malicious HTTP server to overflow the client during NTLM negotiation and for an FTP server to overflow the client during krb4 negotiation. The announcement of this flaw was done without contacting us.
{
"www": "https://curl.se/docs/CVE-2005-0490.html",
"package": "curl",
"severity": "High",
"CWE": {
"id": "CWE-121",
"desc": "Stack-based Buffer Overflow"
},
"URL": "https://curl.se/docs/CVE-2005-0490.json",
"last_affected": "7.13.0",
"affects": "both"
}