CVE-2019-19977Out-of-bounds Read in Project Libesmtp

CWE-125Out-of-bounds Read8 documents7 sources
Severity
9.8CRITICALNVD
EPSS
0.6%
top 29.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 26
Latest updateMay 24

Description

libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-cxg8-9wrx-2mhp: libESMTP through 12022-05-24
OSV
CVE-2019-19977: libESMTP through 12019-12-26

📋Vendor Advisories

3
Red Hat
libesmtp: Stack-based buffer over-read in ntlm_build_type_2() in ntlm/ntlmstruct.c2019-12-26
Microsoft
libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c as demonstrated by a stack-based buffer over-read.2019-12-10
Debian
CVE-2019-19977: libesmtp - libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntl...2019

💬Community

2
Bugzilla
CVE-2019-19977 libesmtp: Stack-based buffer over-read in ntlm_build_type_2() in ntlm/ntlmstruct.c2020-01-08
Bugzilla
CVE-2019-19977 libesmtp: Stack-based buffer over-read in ntlm_build_type_2() in ntlm/ntlmstruct.c [fedora-all]2020-01-08