Your submission was sent successfully! Close

CVE-2019-17455

Published: 10 October 2019

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

From the Ubuntu Security Team

It was discovered that Libntlm incorrectly handled specially crafted NTML requests. An attacker could possibly use this issue to cause a denial of service or another unspecified impact.

Notes

AuthorNote
ebarretto
No fix available as of 2019-12-04
Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
libntlm
Launchpad, Ubuntu, Debian
bionic
Released (1.4-8ubuntu0.1)
disco Ignored
(reached end-of-life)
eoan Ignored
(reached end-of-life)
focal
Released (1.5-2ubuntu0.1)
groovy Not vulnerable
(1.6-1)
hirsute Not vulnerable
(1.6-1)
impish Not vulnerable
(1.6-1)
jammy Not vulnerable
(1.6-1)
precise Does not exist

trusty
Released (1.4-1ubuntu0.1~esm1)
upstream
Released (1.6)
xenial Ignored
(end of standard support, was needs-triage)
Patches:
upstream: https://gitlab.com/jas/libntlm/-/commit/b967886873fcf19f816b9c0868465f2d9e5df85e