mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
26 lines
1.2 KiB
Markdown
26 lines
1.2 KiB
Markdown
![]() |
### [CVE-2018-16890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/KorayAgaya/TrivyWeb
|
||
|
- https://github.com/Mohzeela/external-secret
|
||
|
- https://github.com/michelleamesquita/CVE-2018-16890
|
||
|
- https://github.com/siddharthraopotukuchi/trivy
|
||
|
- https://github.com/simiyo/trivy
|
||
|
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
|
||
|
- https://github.com/umahari/security
|
||
|
- https://github.com/zjw88282740/CVE-2018-16890
|
||
|
|