CVE-2019-3822

Name
CVE-2019-3822
Description
libcurl versions from 7.36.0 to before 7.64.0 are vulnerable to a stack-based buffer overflow. The function creating an outgoing NTLM type-3 header (`lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()`), generates the request HTTP header contents based on previously received data. The check that exists to prevent the local buffer from getting overflowed is implemented wrongly (using unsigned math) and as such it does not prevent the overflow from happening. This output data can grow larger than the local buffer if very large 'nt response' data is extracted from a previous NTLMv2 header provided by the malicious or broken HTTP server. Such a 'large value' needs to be around 1000 bytes or more. The actual payload data copied to the target buffer comes from the NTLMv2 type-2 response header.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://curl.haxx.se/docs/CVE-2019-3822.html
Exploit https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822
Third Party Advisory https://www.debian.org/security/2019/dsa-4386
Third Party Advisory https://usn.ubuntu.com/3882-1/
Third Party Advisory http://www.securityfocus.com/bid/106950
Third Party Advisory https://security.gentoo.org/glsa/201903-03
Patch https://security.netapp.com/advisory/ntap-20190315-0001/
Mailing List https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E
Third Party Advisory https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
Patch https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Third Party Advisory https://security.netapp.com/advisory/ntap-20190719-0004/
Patch https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Third Party Advisory https://support.f5.com/csp/article/K84141449
Third Party Advisory https://support.f5.com/csp/article/K84141449?utm_source=f5support&utm_medium=RSS
Third Party Advisory https://access.redhat.com/errata/RHSA-2019:3701

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:* libcurl >= 7.36.0 < 7.64.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status