CVE-2017-8816

Impact:
Moderate
Public Date:
2017-11-29
CWE:
CWE-190->CWE-122
Bugzilla:
1515757: CVE-2017-8816 curl: NTLM buffer overflow via integer overflow

The MITRE CVE dictionary describes this issue as:

The NTLM authentication feature in curl and libcurl before 7.57.0 on 32-bit platforms allows attackers to cause a denial of service (integer overflow and resultant buffer overflow, and application crash) or possibly have unspecified other impact via vectors involving long user and password fields.

Find out more about CVE-2017-8816 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector Network
Attack Complexity High
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections for Red Hat Enterprise Linux 6 (httpd24-curl) RHSA-2018:3558 2018-11-13
Red Hat Software Collections for Red Hat Enterprise Linux 7 (httpd24-curl) RHSA-2018:3558 2018-11-13

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 curl Not affected
Red Hat Enterprise Linux 6 curl Not affected
Red Hat Enterprise Linux 5 curl Not affected
.NET Core 2.0 on Red Hat Enterprise Linux rh-dotnet20-curl Affected
.NET Core 2.0 on Red Hat Enterprise Linux rh-dotnet21-curl Affected
.NET Core 1.0 on Red Hat Enterprise Linux rh-dotnetcore10-curl Affected
.NET Core 1.0 on Red Hat Enterprise Linux rh-dotnetcore11-curl Affected

Acknowledgements

Red Hat would like to thank the Curl project for reporting this issue. Upstream acknowledges Alex Nichols as the original reporter.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.