FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2005-0490

This CVE name corresponds to:

Entered Topic
2005-02-27 curl -- authentication buffer overflow vulnerability

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2005-0490
Phase Assigned(20050221)

Description

Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.

References

Source Reference
IDEFENSE 20050221 Multiple Unix/Linux Vendor cURL/libcURL NTLM Authentication Buffer Overflow Vulnerability
IDEFENSE 20050221 Multiple Unix/Linux Vendor cURL/libcURL Kerberos Authentication Buffer Overflow Vulnerability
CONECTIVA CLA-2005:940
GENTOO GLSA-200503-20
MANDRAKE MDKSA-2005:048
FULLDISC 20050228 [USN-86-1] cURL vulnerability
REDHAT RHSA-2005:340
SUSE SUSE-SA:2005:011
BID 12615
BID 12616
OVAL oval:org.mitre.oval:def:10273
XF curl-kerberos-bo(19423)