Vulnerabilites related to libcurl - libcurl
Vulnerability from fkie_nvd
Published
2009-08-14 15:16
Modified
2024-11-21 01:04
Severity ?
Summary
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patchPatch, Vendor Advisory
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patchPatch
secalert@redhat.comhttp://curl.haxx.se/docs/adv_20090812.txtVendor Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
secalert@redhat.comhttp://secunia.com/advisories/36238Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36475
secalert@redhat.comhttp://secunia.com/advisories/37471
secalert@redhat.comhttp://secunia.com/advisories/45047
secalert@redhat.comhttp://shibboleth.internet2.edu/secadv/secadv_20090817.txt
secalert@redhat.comhttp://support.apple.com/kb/HT4077
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2009-0124
secalert@redhat.comhttp://www.securityfocus.com/archive/1/506055/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/507985/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/36032
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1158-1
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2009-0016.html
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/2263Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/3316
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/52405
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://curl.haxx.se/docs/adv_20090812.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36238Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36475
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37471
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45047
af854a3a-2127-422b-91ae-364da2661108http://shibboleth.internet2.edu/secadv/secadv_20090817.txt
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0124
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/506055/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507985/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36032
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1158-1
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2009-0016.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2263Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/3316
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/52405
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542
Impacted products
Vendor Product Version
curl libcurl 7.4
curl libcurl 7.4.1
curl libcurl 7.4.2
curl libcurl 7.5
curl libcurl 7.5.1
curl libcurl 7.5.2
curl libcurl 7.6
curl libcurl 7.6.1
curl libcurl 7.7
curl libcurl 7.7.1
curl libcurl 7.7.2
curl libcurl 7.7.3
curl libcurl 7.8
curl libcurl 7.8.1
curl libcurl 7.9
curl libcurl 7.9.1
curl libcurl 7.9.2
curl libcurl 7.9.3
curl libcurl 7.9.5
curl libcurl 7.9.6
curl libcurl 7.9.7
curl libcurl 7.9.8
curl libcurl 7.10
curl libcurl 7.10.1
curl libcurl 7.10.2
curl libcurl 7.10.3
curl libcurl 7.10.4
curl libcurl 7.10.5
curl libcurl 7.10.6
curl libcurl 7.10.7
curl libcurl 7.10.8
curl libcurl 7.11.0
curl libcurl 7.11.1
curl libcurl 7.11.2
curl libcurl 7.12
curl libcurl 7.12.0
curl libcurl 7.12.1
curl libcurl 7.12.2
curl libcurl 7.12.3
curl libcurl 7.13
curl libcurl 7.13.1
curl libcurl 7.13.2
curl libcurl 7.14
curl libcurl 7.14.1
curl libcurl 7.15
curl libcurl 7.15.1
curl libcurl 7.15.2
curl libcurl 7.15.3
curl libcurl 7.16.3
curl libcurl 7.17.0
curl libcurl 7.17.1
curl libcurl 7.18.0
curl libcurl 7.18.1
curl libcurl 7.18.2
curl libcurl 7.19.0
curl libcurl 7.19.1
curl libcurl 7.19.2
curl libcurl 7.19.3
curl libcurl 7.19.4
curl libcurl 7.19.5
libcurl libcurl 7.12
libcurl libcurl 7.12.1
libcurl libcurl 7.12.2
libcurl libcurl 7.12.3
libcurl libcurl 7.13
libcurl libcurl 7.13.1
libcurl libcurl 7.13.2
libcurl libcurl 7.14
libcurl libcurl 7.14.1
libcurl libcurl 7.15
libcurl libcurl 7.15.1
libcurl libcurl 7.15.2
libcurl libcurl 7.15.3
libcurl libcurl 7.16.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4F46D5-85E5-4483-AD3D-207E9121FE3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C3A6114-AA64-45E0-99D7-FAB060B8657B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCCF67A1-874A-41A3-85C9-2BDCD193CE22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4321D25E-27DE-4649-A9B7-C6295F05ABB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "25774954-E239-4337-9931-D4F6A69B42F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A000CAB-5986-4568-96C2-B7E213C77E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37C5745B-2FFF-4DF8-883B-417015BDDF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76A50325-2247-46EF-A991-70378C4D008F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58D1562-5A17-4124-8010-6098A204C898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C461E700-752D-4A31-A3A4-2B758CE07704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8B6BE8-BC9A-443D-B6C8-4B5FF2390306",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "83681317-F32A-4C73-915A-D431E8DF944C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9D9C492-5F87-4149-ACAE-948DBE35E40D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "70655CE0-63F0-402C-B335-FCFA494335C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F6A6A05-E568-46F2-B2F5-73300E4EA5BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F102275D-8116-4F65-8910-478CB8DAAE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68C14C1-AFDF-4DE7-BD06-2A7FE079656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD860AC-DE24-4CD5-B2C9-C77BD95AAFD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "403DDE56-5FA7-4920-A905-30349E61361B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "F001A45E-CFD8-4B41-9281-F01A284ECD58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "580BAB7A-3BE0-4FA1-9CAF-124F16882518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21AE58E9-F201-41AA-A1DC-9EB09E50459A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C901C070-728C-41CD-8E4F-ECCB779906C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A1D7EA-6567-4A48-A431-EA28508D62C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D8F50B-495E-48B3-BF9F-8E4ACA556B2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "00F4FFF6-6AB4-4857-BDFA-12801C972708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9987313-0256-4837-B347-6ABEF18DFCBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D703855E-6610-445D-B498-61CE1C763A9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7B64A2-6779-4A01-9864-902E2C04B08B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A07B1635-6F28-4ED4-A2AC-CD7E9549C920",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.10.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA4392F-2582-4EFE-9450-3F12588BE981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53E91EAD-3813-498B-9B5C-05F1DCF75D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CDDBC13-1646-490B-B778-DBD3BB3208C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B87F05D-C077-4929-8BBA-A7287A816470",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DEC85E8-5555-46A9-9A95-30E1497AFA09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA22553-089B-44D2-B545-82F7AED74E25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "03060364-7DCD-4111-BF7A-BEF6AFCB3134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "319DADFB-081B-46AA-9F7D-DD4D1C5BE26D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9C6906-5FBD-4736-87B6-720E288E394A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4931FF86-51B6-470A-A2E0-A1B0942D1CF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA9DA33F-A33E-483E-AE4D-4422D62C02E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5028DB2-87D5-4AD8-87D4-325C519D6CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E992CDB0-A787-4F7E-AC55-13FE7C68A1D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "808143C5-108B-45BE-B626-A44F9F956018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EBBB3F1-98BD-40D1-B09F-1924D567625A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D5DAE5-ABEA-4FF1-836C-BA4741F13323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E15191F-D4E6-425C-81BE-2CD55A815B5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0407CCC0-ACAA-4B2A-99A5-DA57791057B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "248D86F7-A8E5-448D-A55A-C05278BB9822",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.17.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "295EE8FF-18BD-4F67-9045-83A5693AB783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.17.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "249C50ED-B681-4DFB-83CD-625D703CD95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.18.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F060A3-FC8E-45CD-85AB-247D13A2896C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.18.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14BB81D-841D-456C-9CAE-CC679FFAB5E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.18.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBA081D-AB88-4895-8495-6B51EB6B5325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8F6B4C1-B88F-4675-BAB7-66A4DFAC17AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A44CE5AD-27B6-45EB-A0B8-CF9BDB31F0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "63984E6B-54EF-4DD6-8A5B-DD16A9A6A4B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBACF741-C988-4800-A9FF-E4836A1EE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "95C5A868-2EC9-4FC6-A074-E587A203A350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:curl:libcurl:7.19.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "54613E59-4583-405C-9BA3-609D47B9FFEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7DE39A-325D-42F5-B4ED-C971725232DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEC10D0-622A-4037-9D4A-69814226CC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9D0343C-175D-44BA-BCCF-5F204C749EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "69D4C0FC-6848-4D18-98E8-4A2F4D7BECC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E66EA58-F408-4D8B-9614-67B936B0F1FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "75BED785-BD7D-4A09-9B50-77548E64916D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A61633-B9B8-44B5-B352-29F4BFBD2BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF6D258-2A8C-40C3-9171-4C4A5B22B30C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB80911-5BD5-401D-8C0A-8229A71D0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE508863-DB77-41D3-A438-3F26C34703E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B79E431-AD91-4269-B427-DD1169D12659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "479069C9-D3E5-4909-8368-0B0F4704810B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADB9299-3EFA-45E6-95BD-7FE2E1B1D565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F93365-54FD-45D4-B878-13A53A6806A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
    },
    {
      "lang": "es",
      "value": "lib/ssluse.c en cURL y libcurl v7.4 hasta v7.19.5, cuando se usa OpenSSL, no maneja de forma aecuada el caracter \u0027\\0\u0027 en un nombre de dominio en el campo sujeto del Common Name (CN) de un certificado X.509, lo que permite a atacantes de hombre en el medio hacer un spoofing de servidores SSL a trav\u00e9s de la un certificado de una autoridad de Certificaci\u00f3n leg\u00edtima, manipulado, relativo a CVE_2009-2408."
    }
  ],
  "id": "CVE-2009-2417",
  "lastModified": "2024-11-21T01:04:49.463",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-08-14T15:16:27.390",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20090812.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36238"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/36475"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45047"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/36032"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1158-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2263"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://curl.haxx.se/docs/adv_20090812.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/37471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45047"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1158-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2263"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/3316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-07-18 17:30
Modified
2024-11-21 00:33
Severity ?
Summary
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
References
security@ubuntu.comhttp://secunia.com/advisories/26104Patch, Vendor Advisory
security@ubuntu.comhttp://secunia.com/advisories/26108Patch, Vendor Advisory
security@ubuntu.comhttp://secunia.com/advisories/26128
security@ubuntu.comhttp://secunia.com/advisories/26231
security@ubuntu.comhttp://www.curl.haxx.se/docs/adv_20070710.htmlPatch, Vendor Advisory
security@ubuntu.comhttp://www.debian.org/security/2007/dsa-1333
security@ubuntu.comhttp://www.securityfocus.com/bid/24938
security@ubuntu.comhttp://www.trustix.org/errata/2007/0023/
security@ubuntu.comhttp://www.ubuntu.com/usn/usn-484-1Patch
security@ubuntu.comhttp://www.vupen.com/english/advisories/2007/2551
security@ubuntu.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/35479
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26104Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26108Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26128
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26231
af854a3a-2127-422b-91ae-364da2661108http://www.curl.haxx.se/docs/adv_20070710.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1333
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/24938
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0023/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-484-1Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2551
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/35479
Impacted products
Vendor Product Version
libcurl libcurl 7.14
libcurl libcurl 7.14.1
libcurl libcurl 7.15
libcurl libcurl 7.15.1
libcurl libcurl 7.15.2
libcurl libcurl 7.15.3
libcurl libcurl 7.16.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACF6D258-2A8C-40C3-9171-4C4A5B22B30C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.14.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DB80911-5BD5-401D-8C0A-8229A71D0804",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE508863-DB77-41D3-A438-3F26C34703E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B79E431-AD91-4269-B427-DD1169D12659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "479069C9-D3E5-4909-8368-0B0F4704810B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.15.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADB9299-3EFA-45E6-95BD-7FE2E1B1D565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.16.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F93365-54FD-45D4-B878-13A53A6806A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions."
    },
    {
      "lang": "es",
      "value": "El libcurl 7.14.0 hasta el 7.16.3, cuando est\u00e1 construido sobre el soporte GnuTLS, no verifica la espiraci\u00f3n del certificado SSL/TLS o las fechas de activaci\u00f3n, lo que permite a atacantes remotos evitar ciertas restricciones de acceso."
    }
  ],
  "id": "CVE-2007-3564",
  "lastModified": "2024-11-21T00:33:32.643",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-18T17:30:00.000",
  "references": [
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26104"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26108"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/26128"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/26231"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.debian.org/security/2007/dsa-1333"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.securityfocus.com/bid/24938"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.trustix.org/errata/2007/0023/"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ubuntu.com/usn/usn-484-1"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.vupen.com/english/advisories/2007/2551"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24938"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0023/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.ubuntu.com/usn/usn-484-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable.  The curl packages as shipped with Red Hat Enterprise Linux versions 2.1, 3, 4 and 5 are not linked against the gnutls library.",
      "lastModified": "2007-07-20T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-10-13 22:02
Modified
2024-11-21 00:01
Severity ?
Summary
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=302847
cve@mitre.orghttp://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
cve@mitre.orghttp://secunia.com/advisories/17192Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17193Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17203Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17208Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17228Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17247Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17297Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17320Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17400Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17403Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17485Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17813Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17965Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/19193Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/82
cve@mitre.orghttp://securitytracker.com/id?1015056
cve@mitre.orghttp://securitytracker.com/id?1015057
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
cve@mitre.orghttp://www.debian.org/security/2005/dsa-919
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=322&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2005:182
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
cve@mitre.orghttp://www.osvdb.org/20011
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
cve@mitre.orghttp://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-807.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-812.html
cve@mitre.orghttp://www.securityfocus.com/bid/15102
cve@mitre.orghttp://www.securityfocus.com/bid/15647
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2088Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2125Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2005/2659Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/22721
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
cve@mitre.orghttps://usn.ubuntu.com/205-1/
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=302847
af854a3a-2127-422b-91ae-364da2661108http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17192Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17193Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17203Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17208Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17228Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17247Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17297Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17320Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17400Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17403Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17485Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17813Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17965Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19193Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/82
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015056
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015057
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-919
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=322&type=vulnerabilitiesPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2005:182
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/20011
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-807.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-812.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15102
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/15647
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2088Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2125Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2005/2659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/22721
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/205-1/
Impacted products
Vendor Product Version
curl curl 7.13.2
libcurl libcurl 7.13.2
wget wget 1.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2458D0E-66F7-484C-9989-308530AE766D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A61633-B9B8-44B5-B352-29F4BFBD2BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "551786A9-941B-4FCF-A9F4-EFC560CE5316",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username."
    }
  ],
  "id": "CVE-2005-3185",
  "lastModified": "2024-11-21T00:01:18.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-10-13T22:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=302847"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17192"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17193"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17203"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17208"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17228"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17297"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17320"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17400"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17403"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17485"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17813"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17965"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19193"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/82"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015056"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015057"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-919"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/20011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15102"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/15647"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2088"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2125"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2659"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/205-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=302847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17203"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17297"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/82"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/20011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/15647"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/205-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2009-2417
Vulnerability from cvelistv5
Published
2009-08-14 15:00
Modified
2024-08-07 05:52
Severity ?
Summary
lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
References
http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patchx_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patchx_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patchx_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patchx_refsource_CONFIRM
http://www.securityfocus.com/archive/1/506055/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/37471third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/2263vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-1158-1vendor-advisory, x_refsource_UBUNTU
http://www.vmware.com/security/advisories/VMSA-2009-0016.htmlx_refsource_CONFIRM
http://secunia.com/advisories/36238third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlvendor-advisory, x_refsource_APPLE
https://exchange.xforce.ibmcloud.com/vulnerabilities/52405vdb-entry, x_refsource_XF
http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patchx_refsource_CONFIRM
http://wiki.rpath.com/Advisories:rPSA-2009-0124x_refsource_CONFIRM
http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patchx_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542vdb-entry, signature, x_refsource_OVAL
http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patchx_refsource_CONFIRM
http://www.securityfocus.com/archive/1/507985/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://support.apple.com/kb/HT4077x_refsource_CONFIRM
http://shibboleth.internet2.edu/secadv/secadv_20090817.txtx_refsource_CONFIRM
http://secunia.com/advisories/36475third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114vdb-entry, signature, x_refsource_OVAL
http://curl.haxx.se/docs/adv_20090812.txtx_refsource_CONFIRM
http://secunia.com/advisories/45047third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/36032vdb-entry, x_refsource_BID
http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patchx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/3316vdb-entry, x_refsource_VUPEN
http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patchx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
          },
          {
            "name": "20090824 rPSA-2009-0124-1 curl",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
          },
          {
            "name": "37471",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37471"
          },
          {
            "name": "ADV-2009-2263",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/2263"
          },
          {
            "name": "USN-1158-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1158-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
          },
          {
            "name": "36238",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36238"
          },
          {
            "name": "APPLE-SA-2010-03-29-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
          },
          {
            "name": "curl-certificate-security-bypass(52405)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
          },
          {
            "name": "oval:org.mitre.oval:def:8542",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
          },
          {
            "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT4077"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
          },
          {
            "name": "36475",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/36475"
          },
          {
            "name": "oval:org.mitre.oval:def:10114",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/docs/adv_20090812.txt"
          },
          {
            "name": "45047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45047"
          },
          {
            "name": "36032",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36032"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
          },
          {
            "name": "ADV-2009-3316",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3316"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-08-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a \u0027\\0\u0027 character in a domain name in the subject\u0027s Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.1-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.0-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.19.5-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.12.1-CVE-2009-2417.patch"
        },
        {
          "name": "20090824 rPSA-2009-0124-1 curl",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/506055/100/0/threaded"
        },
        {
          "name": "37471",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37471"
        },
        {
          "name": "ADV-2009-2263",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/2263"
        },
        {
          "name": "USN-1158-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1158-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html"
        },
        {
          "name": "36238",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36238"
        },
        {
          "name": "APPLE-SA-2010-03-29-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
        },
        {
          "name": "curl-certificate-security-bypass(52405)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52405"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.16.4-CVE-2009-2417.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.10.6-CVE-2009-2417.patch"
        },
        {
          "name": "oval:org.mitre.oval:def:8542",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8542"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.18.1-CVE-2009-2417.patch"
        },
        {
          "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT4077"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://shibboleth.internet2.edu/secadv/secadv_20090817.txt"
        },
        {
          "name": "36475",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/36475"
        },
        {
          "name": "oval:org.mitre.oval:def:10114",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10114"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/docs/adv_20090812.txt"
        },
        {
          "name": "45047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45047"
        },
        {
          "name": "36032",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36032"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.15.5-CVE-2009-2417.patch"
        },
        {
          "name": "ADV-2009-3316",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3316"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://curl.haxx.se/CVE-2009-2417/curl-7.11.0-CVE-2009-2417.patch"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2009-2417",
    "datePublished": "2009-08-14T15:00:00",
    "dateReserved": "2009-07-09T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-3564
Vulnerability from cvelistv5
Published
2007-07-18 17:00
Modified
2024-08-07 14:21
Severity ?
Summary
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
References
http://secunia.com/advisories/26231third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/2551vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26128third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26108third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/24938vdb-entry, x_refsource_BID
http://www.trustix.org/errata/2007/0023/vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/26104third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-484-1vendor-advisory, x_refsource_UBUNTU
https://exchange.xforce.ibmcloud.com/vulnerabilities/35479vdb-entry, x_refsource_XF
http://www.curl.haxx.se/docs/adv_20070710.htmlx_refsource_MISC
http://www.debian.org/security/2007/dsa-1333vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.293Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "26231",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26231"
          },
          {
            "name": "ADV-2007-2551",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2551"
          },
          {
            "name": "26128",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26128"
          },
          {
            "name": "26108",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26108"
          },
          {
            "name": "24938",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24938"
          },
          {
            "name": "2007-0023",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0023/"
          },
          {
            "name": "26104",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26104"
          },
          {
            "name": "USN-484-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-484-1"
          },
          {
            "name": "libcurl-gnutls-weak-security(35479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
          },
          {
            "name": "DSA-1333",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1333"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "26231",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26231"
        },
        {
          "name": "ADV-2007-2551",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2551"
        },
        {
          "name": "26128",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26128"
        },
        {
          "name": "26108",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26108"
        },
        {
          "name": "24938",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24938"
        },
        {
          "name": "2007-0023",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0023/"
        },
        {
          "name": "26104",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26104"
        },
        {
          "name": "USN-484-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-484-1"
        },
        {
          "name": "libcurl-gnutls-weak-security(35479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
        },
        {
          "name": "DSA-1333",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1333"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2007-3564",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "26231",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26231"
            },
            {
              "name": "ADV-2007-2551",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2551"
            },
            {
              "name": "26128",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26128"
            },
            {
              "name": "26108",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26108"
            },
            {
              "name": "24938",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24938"
            },
            {
              "name": "2007-0023",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0023/"
            },
            {
              "name": "26104",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26104"
            },
            {
              "name": "USN-484-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-484-1"
            },
            {
              "name": "libcurl-gnutls-weak-security(35479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35479"
            },
            {
              "name": "http://www.curl.haxx.se/docs/adv_20070710.html",
              "refsource": "MISC",
              "url": "http://www.curl.haxx.se/docs/adv_20070710.html"
            },
            {
              "name": "DSA-1333",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1333"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2007-3564",
    "datePublished": "2007-07-18T17:00:00",
    "dateReserved": "2007-07-05T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-3185
Vulnerability from cvelistv5
Published
2005-10-13 04:00
Modified
2024-08-07 23:01
Severity ?
Summary
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
References
http://www.idefense.com/application/poi/display?id=322&type=vulnerabilitiesthird-party-advisory, x_refsource_IDEFENSE
http://secunia.com/advisories/17247third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.htmlvendor-advisory, x_refsource_FEDORA
http://www.redhat.com/support/errata/RHSA-2005-812.htmlvendor-advisory, x_refsource_REDHAT
http://securitytracker.com/id?1015057vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/17813third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17485third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2659vdb-entry, x_refsource_VUPEN
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.htmlvendor-advisory, x_refsource_TRUSTIX
http://www.debian.org/security/2005/dsa-919vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/22721vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2005/2088vdb-entry, x_refsource_VUPEN
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/17297third-party-advisory, x_refsource_SECUNIA
http://securityreason.com/securityalert/82third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/17193third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17403third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/205-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/17208third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2005_63_wget_curl.htmlvendor-advisory, x_refsource_SUSE
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810vdb-entry, signature, x_refsource_OVAL
http://docs.info.apple.com/article.html?artnum=302847vendor-advisory, x_refsource_APPLE
http://www.securityfocus.com/bid/15102vdb-entry, x_refsource_BID
http://secunia.com/advisories/17203third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17965third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2005/2125vdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDKSA-2005:182vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/17400third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/17192third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/15647vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200510-19.xmlvendor-advisory, x_refsource_GENTOO
http://securitytracker.com/id?1015056vdb-entry, x_refsource_SECTRACK
http://www.redhat.com/support/errata/RHSA-2005-807.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/19193third-party-advisory, x_refsource_SECUNIA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txtvendor-advisory, x_refsource_SCO
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010vendor-advisory, x_refsource_SLACKWARE
http://secunia.com/advisories/17320third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/20011vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/17228third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:01:59.006Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
          },
          {
            "name": "17247",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17247"
          },
          {
            "name": "FEDORA-2005-1000",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
          },
          {
            "name": "RHSA-2005:812",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
          },
          {
            "name": "1015057",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015057"
          },
          {
            "name": "17813",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17813"
          },
          {
            "name": "17485",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17485"
          },
          {
            "name": "ADV-2005-2659",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2659"
          },
          {
            "name": "TSLSA-2005-0059",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
          },
          {
            "name": "DSA-919",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-919"
          },
          {
            "name": "wget-curl-ntlm-username-bo(22721)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
          },
          {
            "name": "ADV-2005-2088",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2088"
          },
          {
            "name": "FEDORA-2005-1129",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
          },
          {
            "name": "17297",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17297"
          },
          {
            "name": "82",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/82"
          },
          {
            "name": "17193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17193"
          },
          {
            "name": "17403",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17403"
          },
          {
            "name": "USN-205-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/205-1/"
          },
          {
            "name": "17208",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17208"
          },
          {
            "name": "SUSE-SA:2005:063",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9810",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
          },
          {
            "name": "APPLE-SA-2005-11-29",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=302847"
          },
          {
            "name": "15102",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15102"
          },
          {
            "name": "17203",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17203"
          },
          {
            "name": "17965",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17965"
          },
          {
            "name": "ADV-2005-2125",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2125"
          },
          {
            "name": "MDKSA-2005:182",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
          },
          {
            "name": "17400",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17400"
          },
          {
            "name": "17192",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17192"
          },
          {
            "name": "15647",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/15647"
          },
          {
            "name": "GLSA-200510-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
          },
          {
            "name": "1015056",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015056"
          },
          {
            "name": "RHSA-2005:807",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
          },
          {
            "name": "19193",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19193"
          },
          {
            "name": "SCOSA-2006.10",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
          },
          {
            "name": "SSA:2005-310-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
          },
          {
            "name": "17320",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17320"
          },
          {
            "name": "20011",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/20011"
          },
          {
            "name": "17228",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17228"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-10-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
        },
        {
          "name": "17247",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17247"
        },
        {
          "name": "FEDORA-2005-1000",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
        },
        {
          "name": "RHSA-2005:812",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
        },
        {
          "name": "1015057",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015057"
        },
        {
          "name": "17813",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17813"
        },
        {
          "name": "17485",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17485"
        },
        {
          "name": "ADV-2005-2659",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2659"
        },
        {
          "name": "TSLSA-2005-0059",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
        },
        {
          "name": "DSA-919",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-919"
        },
        {
          "name": "wget-curl-ntlm-username-bo(22721)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
        },
        {
          "name": "ADV-2005-2088",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2088"
        },
        {
          "name": "FEDORA-2005-1129",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
        },
        {
          "name": "17297",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17297"
        },
        {
          "name": "82",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/82"
        },
        {
          "name": "17193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17193"
        },
        {
          "name": "17403",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17403"
        },
        {
          "name": "USN-205-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/205-1/"
        },
        {
          "name": "17208",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17208"
        },
        {
          "name": "SUSE-SA:2005:063",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9810",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
        },
        {
          "name": "APPLE-SA-2005-11-29",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=302847"
        },
        {
          "name": "15102",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15102"
        },
        {
          "name": "17203",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17203"
        },
        {
          "name": "17965",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17965"
        },
        {
          "name": "ADV-2005-2125",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2125"
        },
        {
          "name": "MDKSA-2005:182",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
        },
        {
          "name": "17400",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17400"
        },
        {
          "name": "17192",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17192"
        },
        {
          "name": "15647",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/15647"
        },
        {
          "name": "GLSA-200510-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
        },
        {
          "name": "1015056",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015056"
        },
        {
          "name": "RHSA-2005:807",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
        },
        {
          "name": "19193",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19193"
        },
        {
          "name": "SCOSA-2006.10",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
        },
        {
          "name": "SSA:2005-310-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
        },
        {
          "name": "17320",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17320"
        },
        {
          "name": "20011",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/20011"
        },
        {
          "name": "17228",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17228"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-3185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20051013 Multiple Vendor wget/curl NTLM Username Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=322\u0026type=vulnerabilities"
            },
            {
              "name": "17247",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17247"
            },
            {
              "name": "FEDORA-2005-1000",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"
            },
            {
              "name": "RHSA-2005:812",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-812.html"
            },
            {
              "name": "1015057",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015057"
            },
            {
              "name": "17813",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17813"
            },
            {
              "name": "17485",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17485"
            },
            {
              "name": "ADV-2005-2659",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2659"
            },
            {
              "name": "TSLSA-2005-0059",
              "refsource": "TRUSTIX",
              "url": "http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"
            },
            {
              "name": "DSA-919",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-919"
            },
            {
              "name": "wget-curl-ntlm-username-bo(22721)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"
            },
            {
              "name": "ADV-2005-2088",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2088"
            },
            {
              "name": "FEDORA-2005-1129",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"
            },
            {
              "name": "17297",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17297"
            },
            {
              "name": "82",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/82"
            },
            {
              "name": "17193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17193"
            },
            {
              "name": "17403",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17403"
            },
            {
              "name": "USN-205-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/205-1/"
            },
            {
              "name": "17208",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17208"
            },
            {
              "name": "SUSE-SA:2005:063",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9810",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"
            },
            {
              "name": "APPLE-SA-2005-11-29",
              "refsource": "APPLE",
              "url": "http://docs.info.apple.com/article.html?artnum=302847"
            },
            {
              "name": "15102",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15102"
            },
            {
              "name": "17203",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17203"
            },
            {
              "name": "17965",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17965"
            },
            {
              "name": "ADV-2005-2125",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2125"
            },
            {
              "name": "MDKSA-2005:182",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"
            },
            {
              "name": "17400",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17400"
            },
            {
              "name": "17192",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17192"
            },
            {
              "name": "15647",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/15647"
            },
            {
              "name": "GLSA-200510-19",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"
            },
            {
              "name": "1015056",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015056"
            },
            {
              "name": "RHSA-2005:807",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2005-807.html"
            },
            {
              "name": "19193",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19193"
            },
            {
              "name": "SCOSA-2006.10",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"
            },
            {
              "name": "SSA:2005-310-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2005\u0026m=slackware-security.519010"
            },
            {
              "name": "17320",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17320"
            },
            {
              "name": "20011",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/20011"
            },
            {
              "name": "17228",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17228"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-3185",
    "datePublished": "2005-10-13T04:00:00",
    "dateReserved": "2005-10-12T00:00:00",
    "dateUpdated": "2024-08-07T23:01:59.006Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-200505-0198
Vulnerability from variot

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. cURL/libcURL 7.13.0 Previously, Kerberos Authentication and NTLM from the site performing the authentication. It has been reported that cURL and libcURL are vulnerable to a remotely exploitable stack-based buffer overflow vulnerability. The cURL and libcURL NTML response processing code fails to ensure that a buffer overflow cannot occur when response data is decoded. The overflow occurs in the stack region, and remote code execution is possible if the saved instruction pointer is overwritten with a pointer to embedded instructions.

Background

curl is a command line tool for transferring files via many different protocols.

Affected packages

-------------------------------------------------------------------
 Package        /  Vulnerable  /                        Unaffected
-------------------------------------------------------------------

1 net-misc/curl < 7.13.1 >= 7.13.1

Description

curl fails to properly check boundaries when handling NTLM authentication.

Impact

With a malicious server an attacker could send a carefully crafted NTLM response to a connecting client leading to the execution of arbitrary code with the permissions of the user running curl.

Workaround

Disable NTLM authentication by not using the --anyauth or --ntlm options.

Resolution

All curl users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1"

References

[ 1 ] CAN-2005-0490 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200503-20.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.

License

Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0198",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "haxx",
        "version": "7.12.1"
      },
      {
        "model": "curl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "haxx",
        "version": "7.12.1"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "3 (ws)"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "4 (as)"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "4 (es)"
      },
      {
        "model": "asianux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u682a\u5f0f\u4f1a\u793e",
        "version": null
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "3 (es)"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "4 (ws)"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "2.1 (ws)"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "3 (as)"
      },
      {
        "model": "turbolinux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "2.1 (es)"
      },
      {
        "model": "red hat enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": "2.1 (as)"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.4.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.2"
      },
      {
        "model": "linux alt linux junior",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alt",
        "version": "2.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.1"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "linux mandrake amd64",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mandriva",
        "version": "10.0"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.13"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.3"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5"
      },
      {
        "model": "big-ip",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.11.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "6.5.1"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.13"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.4"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.4"
      },
      {
        "model": "3-dns",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.6.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "6.5.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.12.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.12.1"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "propack",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "sgi",
        "version": "3.0"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.2.1"
      },
      {
        "model": "corporate server x86 64",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mandrakesoft",
        "version": "3.0"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.12.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.7"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.6,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.6"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.12"
      },
      {
        "model": "stenberg curl",
        "scope": "ne",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.13.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.5"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.11"
      },
      {
        "model": "linux mandrake x86 64",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mandriva",
        "version": "10.1"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.0"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.11"
      },
      {
        "model": "3-dns",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.6.2"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.6"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.9"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.11.1"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.3"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.12"
      },
      {
        "model": "corporate server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mandrakesoft",
        "version": "3.0"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.6"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.8"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.10.4"
      },
      {
        "model": "linux alt linux compact",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "alt",
        "version": "2.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.1.1"
      },
      {
        "model": "linux mandrake",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "mandriva",
        "version": "10.0"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "daniel",
        "version": "7.1"
      },
      {
        "model": "big-ip",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "f5",
        "version": "4.5.10"
      },
      {
        "model": "libcurl",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "libcurl",
        "version": "7.12.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.5.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.10"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.10.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.5"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.7"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.5"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.4"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.5.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.6"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.7.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.7.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.0"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.8"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.4.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.4"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.3"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.8"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.6"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.7"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.8.1"
      },
      {
        "model": "stenberg curl beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "6.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.9.5"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.7.1"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.6.1"
      },
      {
        "model": "linux enterprise server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "9"
      },
      {
        "model": "linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "1.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "8.1"
      },
      {
        "model": "linux i386",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "suse",
        "version": "8.0"
      },
      {
        "model": "linux personal x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.2"
      },
      {
        "model": "linux personal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.2"
      },
      {
        "model": "linux personal x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.1"
      },
      {
        "model": "linux personal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.1"
      },
      {
        "model": "linux personal x86 64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.0"
      },
      {
        "model": "linux personal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "9.0"
      },
      {
        "model": "linux personal",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "s u s e",
        "version": "8.2"
      },
      {
        "model": "stenberg curl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "daniel",
        "version": "7.8.2"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Credited to infamous41md[at]hotpop.com.",
    "sources": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2005-0490",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2005-0490",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2005-0490",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 8.8,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2005-0490",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "Low",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2005-0490",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2005-0490",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200505-184",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication. cURL/libcURL 7.13.0 Previously, Kerberos Authentication and NTLM from the site performing the authentication. It has been reported that cURL and libcURL are vulnerable to a remotely exploitable stack-based buffer overflow vulnerability.  The cURL and libcURL NTML response processing code fails to ensure that a buffer overflow cannot occur when response data is decoded. \nThe overflow occurs in the stack region, and remote code execution is possible if the saved instruction pointer is overwritten with a pointer to embedded instructions. \n\nBackground\n==========\n\ncurl is a command line tool for transferring files via many different\nprotocols. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package        /  Vulnerable  /                        Unaffected\n    -------------------------------------------------------------------\n  1  net-misc/curl      \u003c 7.13.1                             \u003e= 7.13.1\n\nDescription\n===========\n\ncurl fails to properly check boundaries when handling NTLM\nauthentication. \n\nImpact\n======\n\nWith a malicious server an attacker could send a carefully crafted NTLM\nresponse to a connecting client leading to the execution of arbitrary\ncode with the permissions of the user running curl. \n\nWorkaround\n==========\n\nDisable NTLM authentication by not using the --anyauth or --ntlm\noptions. \n\nResolution\n==========\n\nAll curl users should upgrade to the latest version:\n\n    # emerge --sync\n    # emerge --ask --oneshot --verbose \"\u003e=net-misc/curl-7.13.1\"\n\nReferences\n==========\n\n  [ 1 ] CAN-2005-0490\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0490\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n  http://security.gentoo.org/glsa/glsa-200503-20.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2005 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.0\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      },
      {
        "db": "PACKETSTORM",
        "id": "36663"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2005-0490",
        "trust": 3.9
      },
      {
        "db": "BID",
        "id": "12616",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "12615",
        "trust": 2.7
      },
      {
        "db": "SECUNIA",
        "id": "14364",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134",
        "trust": 0.8
      },
      {
        "db": "GENTOO",
        "id": "GLSA-200503-20",
        "trust": 0.6
      },
      {
        "db": "MANDRAKE",
        "id": "MDKSA-2005:048",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2005:340",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20050221 MULTIPLE UNIX/LINUX VENDOR CURL/LIBCURL NTLM AUTHENTICATION BUFFER OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20050221 MULTIPLE UNIX/LINUX VENDOR CURL/LIBCURL KERBEROS AUTHENTICATION BUFFER OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "SUSE",
        "id": "SUSE-SA:2005:011",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2005:940",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "19423",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20050228 [USN-86-1] CURL VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-184",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "36663",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "PACKETSTORM",
        "id": "36663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "id": "VAR-200505-0198",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.4615448
  },
  "last_update_date": "2024-11-23T22:57:32.227000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "RHSA-2005",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/support/update/list.php?errata_id=185"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-131",
        "trust": 1.0
      },
      {
        "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/12616"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/12615"
      },
      {
        "trust": 1.6,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml"
      },
      {
        "trust": 1.6,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000940"
      },
      {
        "trust": 1.6,
        "url": "http://www.idefense.com/application/poi/display?id=203\u0026type=vulnerabilities"
      },
      {
        "trust": 1.6,
        "url": "http://www.idefense.com/application/poi/display?id=202\u0026type=vulnerabilities"
      },
      {
        "trust": 1.6,
        "url": "http://www.redhat.com/support/errata/rhsa-2005-340.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.novell.com/linux/security/advisories/2005_11_curl.html"
      },
      {
        "trust": 1.6,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2005:048"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=full-disclosure\u0026m=110959085507755\u0026w=2"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19423"
      },
      {
        "trust": 1.0,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10273"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0490"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/14364/"
      },
      {
        "trust": 0.6,
        "url": "http://lists.altlinux.ru/pipermail/security-announce/2005-march/000287.html"
      },
      {
        "trust": 0.6,
        "url": "http://curl.haxx.se/"
      },
      {
        "trust": 0.6,
        "url": "http://curl.haxx.se/changes.html"
      },
      {
        "trust": 0.6,
        "url": "http://www.f5.com/"
      },
      {
        "trust": 0.6,
        "url": "http://rhn.redhat.com/errata/rhsa-2005-340.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=full-disclosure\u0026m=110959085507755\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/19423"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/391041"
      },
      {
        "trust": 0.3,
        "url": "http://www.idefense.com/intelligence/vulnerabilities/display.php?type=vulnerabilities\u0026id=202"
      },
      {
        "trust": 0.1,
        "url": "http://bugs.gentoo.org."
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.0"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0490"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0490"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-200503-20.xml"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "PACKETSTORM",
        "id": "36663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "db": "PACKETSTORM",
        "id": "36663"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2005-02-22T00:00:00",
        "db": "BID",
        "id": "12616"
      },
      {
        "date": "2005-02-22T00:00:00",
        "db": "BID",
        "id": "12615"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "date": "2005-03-22T05:24:05",
        "db": "PACKETSTORM",
        "id": "36663"
      },
      {
        "date": "2005-02-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "date": "2005-05-02T04:00:00",
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-08-24T17:54:00",
        "db": "BID",
        "id": "12616"
      },
      {
        "date": "2006-08-24T17:54:00",
        "db": "BID",
        "id": "12615"
      },
      {
        "date": "2024-02-27T05:23:00",
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      },
      {
        "date": "2005-10-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200505-184"
      },
      {
        "date": "2024-11-20T23:55:15.240000",
        "db": "NVD",
        "id": "CVE-2005-0490"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "network",
    "sources": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "cURL/libcURL\u00a0 of \u00a0Kerberos\u00a0 Authentication and \u00a0NTLM\u00a0 Buffer overflow vulnerability in authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2005-000134"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "12616"
      },
      {
        "db": "BID",
        "id": "12615"
      }
    ],
    "trust": 0.6
  }
}