CVE-2019-17455

Published: 10 October 2019

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

From the Ubuntu security team

It was discovered that Libntlm incorrectly handled specially crafted NTML requests. An attacker could possibly use this issue to cause a denial of service or another unspecified impact.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libntlm
Launchpad, Ubuntu, Debian
Upstream
Released (1.6)
Ubuntu 21.10 (Impish Indri) Not vulnerable
(1.6-1)
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
(1.6-1)
Ubuntu 20.04 LTS (Focal Fossa)
Released (1.5-2ubuntu0.1)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (1.4-8ubuntu0.1)
Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.4-1ubuntu0.1~esm1)
Patches:
Upstream: https://gitlab.com/jas/libntlm/-/commit/b967886873fcf19f816b9c0868465f2d9e5df85e