CVE-2019-17455

CRITICAL

Nongnu Libntlm < 1.5 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

References (10)

Core 10
Core References
Exploit, Third Party Advisory x_refsource_misc
https://gitlab.com/jas/libntlm/issues/2
Third Party Advisory x_refsource_confirm
https://security-tracker.debian.org/tracker/CVE-2019-17455
Exploit, Issue Tracking, Mailing List, Third Party Advisory x_refsource_misc
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942145
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2020/05/msg00010.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00029.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00032.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/11/msg00026.html

Scores

CVSS v3 9.8
EPSS 0.0708
EPSS Percentile 91.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-125
Status published
Products (11)
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 20.04
debian/debian_linux 8.0
debian/debian_linux 9.0
fedoraproject/fedora 32
fedoraproject/fedora 33
nongnu/libntlm < 1.5
opensuse/backports_sle 15.0 sp1
... and 1 more
Published Oct 10, 2019
Tracked Since Feb 18, 2026