CVE-2005-3185Improper Restriction of Operations within the Bounds of a Memory Buffer in Curl

Severity
7.5HIGHNVD
EPSS
4.9%
top 10.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 13
Latest updateMay 3

Description

Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages5 packages

NVDlibcurl/libcurl7.13.2
Debiangnu/wget< 1.10.2-1+3
Debianhaxx/curl< 7.15.0-1+3
NVDcurl/curl7.13.2
NVDwget/wget1.10

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pr2f-jh2p-p39m: Stack-based buffer overflow in the ntlm_output function in http-ntlm2022-05-03
OSV
CVE-2005-3185: Stack-based buffer overflow in the ntlm_output function in http-ntlm2005-10-13
CVEList
CVE-2005-3185: Stack-based buffer overflow in the ntlm_output function in http-ntlm2005-10-13

📋Vendor Advisories

3
Ubuntu
Curl and wget vulnerabilities2005-10-14
Red Hat
security flaw2005-10-12
Debian
CVE-2005-3185: curl - Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) w...2005

💬Community

2
Bugzilla
CVE-2005-3185 security flaw2018-08-16
Bugzilla
CVE-2005-3185 NTLM buffer overflow2005-10-13
CVE-2005-3185 — Curl vulnerability | cvebase