CVE-2018-16890

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

References

http://www.securityfocus.com/bid/106947

https://access.redhat.com/errata/RHSA-2019:3701

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890

https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf

https://curl.haxx.se/docs/CVE-2018-16890.html

https://lists.apache.org/thread.html/[email protected]%3Cdevnull.infra.apache.org%3E

https://security.netapp.com/advisory/ntap-20190315-0001/

https://support.f5.com/csp/article/K03314397?utm_source=f5support&utm_medium=RSS

https://usn.ubuntu.com/3882-1/

https://www.debian.org/security/2019/dsa-4386

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Details

Source: MITRE

Published: 2019-02-06

Updated: 2020-09-18

Type: CWE-190

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 3.9

Severity: HIGH

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
145603CentOS 8 : curl (CESA-2019:3701)NessusCentOS Local Security Checks
critical
130568RHEL 8 : curl (RHSA-2019:3701)NessusRed Hat Local Security Checks
critical
128714Photon OS 2.0: Curl PHSA-2019-2.0-0171NessusPhotonOS Local Security Checks
high
126783MySQL 5.7.x < 5.7.27 Multiple Vulnerabilities (Jul 2019 CPU)NessusDatabases
critical
124160MySQL 8.0.x < 8.0.16 Multiple Vulnerabilities (Apr 2019 CPU) (Jul 2019 CPU)NessusDatabases
critical
122260Amazon Linux 2 : curl (ALAS-2019-1162)NessusAmazon Linux Local Security Checks
critical
122221openSUSE Security Update : curl (openSUSE-2019-174)NessusSuSE Local Security Checks
critical
122220openSUSE Security Update : curl (openSUSE-2019-173)NessusSuSE Local Security Checks
critical
122149SUSE SLED12 / SLES12 Security Update : curl (SUSE-SU-2019:0339-1)NessusSuSE Local Security Checks
critical
122106Fedora 29 : curl (2019-43489941ff)NessusFedora Local Security Checks
critical
122042FreeBSD : curl -- multiple vulnerabilities (714b033a-2b09-11e9-8bc3-610fd6e6cd05)NessusFreeBSD Local Security Checks
critical
121639Ubuntu 14.04 LTS / 16.04 LTS / 18.04 LTS / 18.10 : curl vulnerabilities (USN-3882-1)NessusUbuntu Local Security Checks
critical
121635SUSE SLED12 / SLES12 Security Update : curl (SUSE-SU-2019:0249-1)NessusSuSE Local Security Checks
critical
121632Slackware 14.0 / 14.1 / 14.2 / current : curl (SSA:2019-037-01)NessusSlackware Local Security Checks
critical
121628Debian DSA-4386-1 : curl - security updateNessusDebian Local Security Checks
critical
121618SUSE SLED15 / SLES15 Security Update : curl (SUSE-SU-2019:0248-1)NessusSuSE Local Security Checks
critical