First published: Mon Feb 21 2005(Updated: )
Multiple stack-based buffer overflows in libcURL and cURL 7.12.1, and possibly other versions, allow remote malicious web servers to execute arbitrary code via base64 encoded replies that exceed the intended buffer lengths when decoded, which is not properly handled by (1) the Curl_input_ntlm function in http_ntlm.c during NTLM authentication or (2) the Curl_krb_kauth and krb4_auth functions in krb4.c during Kerberos authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
haxx curl | =7.12.1 | |
libcurl 3 with GnuTLS support | =7.12.1 | |
curl | =7.12.1 | |
libcurl 3 with GnuTLS support | =7.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0490 is classified as a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2005-0490, upgrade cURL and libcurl to version 7.12.2 or later where the vulnerability is addressed.
CVE-2005-0490 affects cURL and libcurl versions 7.12.1 and possibly earlier versions.
CVE-2005-0490 is a stack-based buffer overflow vulnerability.
Yes, CVE-2005-0490 can allow attackers to execute arbitrary code on affected systems.