Severity
9.8CRITICALNVD
EPSS
7.1%
top 8.46%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 10
Latest updateMay 24

Description

Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

Debiannongnu/libntlm< 1.6-1+3
NVDopensuse/leap15.1

Also affects: Debian Linux 8.0, 9.0, Fedora 32, 33, Ubuntu Linux 14.04, 16.04, 18.04, 20.04

🔴Vulnerability Details

3
GHSA
GHSA-m8c7-4hj3-f3m6: Libntlm through 12022-05-24
CVEList
CVE-2019-17455: Libntlm through 12019-10-10
OSV
CVE-2019-17455: Libntlm through 12019-10-10

📋Vendor Advisories

5
Ubuntu
Libntlm vulnerability2022-02-15
Ubuntu
libntlm vulnerability2021-10-08
Microsoft
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest tSmbNtlmAuthChallenge and tSmbNtlmAuthResponse read and write operations as demonstrated by a stack-based buffer over-read in 2019-10-08
Red Hat
libntlm: stack-based buffer overflow in buildSmbNtlmAuthRequest in smbutil.c2019-10-08
Debian
CVE-2019-17455: libntlm - Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbN...2019

💬Community

4
Bugzilla
CVE-2019-17455 libntlm: stack-based buffer overflow in buildSmbNtlmAuthRequest in smbutil.c2019-11-04
Bugzilla
CVE-2019-17455 libntlm: stack-based buffer overflow in buildSmbNtlmAuthRequest in smbutil.c [epel-7]2019-11-04
Bugzilla
CVE-2019-17455 libntlm: stack-based buffer overflow in buildSmbNtlmAuthRequest in smbutil.c [fedora-all]2019-11-04
Bugzilla
CVE-2019-15215 kernel: use after free in drivers/media/usb/cpia2/cpia2_usb.c driver2019-08-26
CVE-2019-17455 — Out-of-bounds Read in Nongnu Libntlm | cvebase