libcurl's NTLM function can overflow a stack-based buffer if given a too long username or domain name. This would happen if you enable NTLM authentication and either:
A - pass in a username and domain name to libcurl that together are longer than 192 bytes
B - allow (lib)curl to follow HTTP "redirects" (Location: and the appropriate HTTP 30x response code) and the new URL contains a URL with a username and domain name that together are longer than 192 bytes
{ "package": "curl", "severity": "High", "www": "https://curl.se/docs/CVE-2005-3185.html", "last_affected": "7.14.1", "affects": "both", "CWE": { "id": "CWE-121", "desc": "Stack-based Buffer Overflow" }, "URL": "https://curl.se/docs/CVE-2005-3185.json" }