CVE-2005-3185

Publication date 13 October 2005

Last updated 24 July 2024


Ubuntu priority

Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.

Status

Package Ubuntu Release Status
curl 7.04 feisty
Fixed 7.15.5-1ubuntu2.1
6.10 edgy
Fixed 7.15.4-1ubuntu2.2
6.06 LTS dapper
Fixed 7.15.1-1ubuntu2.1
wget 7.04 feisty
Not affected
6.10 edgy
Not affected
6.06 LTS dapper
Not affected

References

Related Ubuntu Security Notices (USN)

    • USN-205-1
    • Curl and wget vulnerabilities
    • 14 October 2005

Other references