GLSA-200503-20 : curl: NTLM response buffer overflow
Medium Nessus Plugin ID 17345
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200503-20 (curl: NTLM response buffer overflow)
curl fails to properly check boundaries when handling NTLM authentication.
With a malicious server an attacker could send a carefully crafted NTLM response to a connecting client leading to the execution of arbitrary code with the permissions of the user running curl.
Disable NTLM authentication by not using the --anyauth or --ntlm options.
SolutionAll curl users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-misc/curl-7.13.1'