Upstream information

CVE-2005-3185 at MITRE

Description

Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 128065, 95647

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX 10.0
  • compat-curl2 >= 7.11.0-7.2
  • compat-curl2-32bit >= 7.11.0-7.2
  • compat-curl2-64bit >= 7.11.0-7.2
SUSE LINUX 9.2
  • compat-curl2 >= 7.11.0-4.4
  • compat-curl2-32bit >= 9.2-200510171251
SUSE LINUX 9.3
  • compat-curl2 >= 7.11.0-6.2
  • compat-curl2-32bit >= 9.3-7.1
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • curl >= 7.11.0-39.9
  • curl-devel >= 7.11.0-39.9
suse91.ia64
sles9-oes.x86
suse91.ppc
suse91.x86-64
suse91.s390
YOU Patch Nr: 10571
SUSE LINUX 10.0
  • curl >= 7.14.0-2.2
  • curl-32bit >= 7.14.0-2.2
  • curl-64bit >= 7.14.0-2.2
SUSE LINUX 9.1 for IA32
  • curl >= 7.11.0-39.9
SUSE LINUX 9.1 for x86-64
  • curl >= 7.11.0-39.9
  • curl-32bit >= 9.1-200510171252
SUSE LINUX 9.2
  • curl >= 7.12.0-2.4
SUSE LINUX 9.3
  • curl >= 7.13.0-5.2
  • curl-32bit >= 9.3-7.1
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • curl >= 7.11.0-39.9
suse91.s390
suse91.ia64
suse91.ppc
sles9-oes.x86
suse91.x86-64
YOU Patch Nr: 10532
SUSE LINUX 10.0
  • wget >= 1.10.1-2.2
SUSE LINUX 9.3
  • wget >= 1.10-1.3