Description
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2207-1 | libntlm security update |
Debian DLA |
DLA-2831-1 | libntlm security update |
EUVD |
EUVD-2019-7844 | Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request. |
Ubuntu USN |
USN-5108-1 | libntlm vulnerability |
Ubuntu USN |
USN-5108-2 | Libntlm vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:40:15.921Z
Reserved: 2019-10-10T00:00:00.000Z
Link: CVE-2019-17455
No data.
Status : Modified
Published: 2019-10-10T18:15:11.647
Modified: 2024-11-21T04:32:21.390
Link: CVE-2019-17455
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN