libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "curl"
},
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "libcurl3"
},
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "libcurl3-gnutls"
},
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "libcurl3-nss"
},
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "libcurl4-gnutls-dev"
},
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "libcurl4-nss-dev"
},
{
"binary_version": "7.47.0-1ubuntu2.12",
"binary_name": "libcurl4-openssl-dev"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "curl"
},
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "libcurl3-gnutls"
},
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "libcurl3-nss"
},
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "libcurl4"
},
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "libcurl4-gnutls-dev"
},
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "libcurl4-nss-dev"
},
{
"binary_version": "7.58.0-2ubuntu3.6",
"binary_name": "libcurl4-openssl-dev"
}
]
}