CVE-2019-17266
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
06/10/2019
Last modified:
07/11/2023
Description
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:* | 2.65.1 (including) | 2.66.4 (excluding) |
cpe:2.3:a:gnome:libsoup:*:*:*:*:*:*:*:* | 2.67.1 (including) | 2.68.1 (including) |
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912
- https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md
- https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab
- https://gitlab.gnome.org/GNOME/libsoup/commit/f8a54ac85eec2008c85393f331cdd251af8266ad
- https://gitlab.gnome.org/GNOME/libsoup/issues/173
- https://security-tracker.debian.org/tracker/CVE-2019-17266
- https://usn.ubuntu.com/4152-1/
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1705054.html