Stack-Based Buffer Overflow in libcurl Affects Various Products
CVE-2019-3822
7.1HIGH
What is CVE-2019-3822?
libcurl, specifically versions ranging from 7.36.0 to just before 7.64.0, contains a stack-based buffer overflow vulnerability. This occurs in the function responsible for crafting outgoing NTLM type-3 headers. Due to incorrect checks in the implementation, the function allows for the potential overflow of the local buffer when processing excessively large 'nt response' data received from a manipulated HTTP server. Mitigating this vulnerability is essential to prevent exploitation that could lead to significant disruptions or unauthorized access.
Affected Version(s)
curl 7.64.0
References
EPSS Score
33% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved