Your submission was sent successfully! Close

CVE-2019-17455

Published: 10 October 2019

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

From the Ubuntu security team

It was discovered that Libntlm incorrectly handled specially crafted NTML requests. An attacker could possibly use this issue to cause a denial of service or another unspecified impact.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libntlm
Launchpad, Ubuntu, Debian
bionic
Released (1.4-8ubuntu0.1)
disco Ignored
(reached end-of-life)
eoan Ignored
(reached end-of-life)
focal
Released (1.5-2ubuntu0.1)
groovy Not vulnerable
(1.6-1)
hirsute Not vulnerable
(1.6-1)
impish Not vulnerable
(1.6-1)
jammy Not vulnerable
(1.6-1)
precise Does not exist

trusty
Released (1.4-1ubuntu0.1~esm1)
upstream
Released (1.6)
xenial Ignored
(end of standard support, was needs-triage)