Vulnerability Details CVE-2019-17455
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations, as demonstrated by a stack-based buffer over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.046
EPSS Ranking 88.8%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2019-17455
-
cpe:2.3:a:nongnu:libntlm:-
-
cpe:2.3:a:nongnu:libntlm:0.0
-
cpe:2.3:a:nongnu:libntlm:0.1
-
cpe:2.3:a:nongnu:libntlm:0.2
-
cpe:2.3:a:nongnu:libntlm:0.21
-
cpe:2.3:a:nongnu:libntlm:0.3.0
-
cpe:2.3:a:nongnu:libntlm:0.3.1
-
cpe:2.3:a:nongnu:libntlm:0.3.10
-
cpe:2.3:a:nongnu:libntlm:0.3.11
-
cpe:2.3:a:nongnu:libntlm:0.3.12
-
cpe:2.3:a:nongnu:libntlm:0.3.13
-
cpe:2.3:a:nongnu:libntlm:0.3.2
-
cpe:2.3:a:nongnu:libntlm:0.3.3
-
cpe:2.3:a:nongnu:libntlm:0.3.4
-
cpe:2.3:a:nongnu:libntlm:0.3.5
-
cpe:2.3:a:nongnu:libntlm:0.3.6
-
cpe:2.3:a:nongnu:libntlm:0.3.7
-
cpe:2.3:a:nongnu:libntlm:0.3.8
-
cpe:2.3:a:nongnu:libntlm:0.3.9
-
cpe:2.3:a:nongnu:libntlm:0.4.0
-
cpe:2.3:a:nongnu:libntlm:0.4.1
-
cpe:2.3:a:nongnu:libntlm:0.4.2
-
cpe:2.3:a:nongnu:libntlm:1.0
-
cpe:2.3:a:nongnu:libntlm:1.1
-
cpe:2.3:a:nongnu:libntlm:1.2
-
cpe:2.3:a:nongnu:libntlm:1.3
-
cpe:2.3:a:nongnu:libntlm:1.4
-
cpe:2.3:a:nongnu:libntlm:1.5
-
cpe:2.3:a:opensuse:backports_sle:15.0
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:canonical:ubuntu_linux:20.04
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:fedoraproject:fedora:32
-
cpe:2.3:o:fedoraproject:fedora:33
-
cpe:2.3:o:opensuse:leap:15.1