First published: Thu Oct 13 2005(Updated: )
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
wget | =1.10 | |
libcurl 3 with GnuTLS support | =7.13.2 | |
curl | =7.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3185 has a high severity rating due to the potential for remote code execution.
To fix CVE-2005-3185, update wget to version 1.10.1, curl to version 7.13.3, or the relevant version of libcurl.
CVE-2005-3185 affects wget version 1.10, curl version 7.13.2, and libcurl version 7.13.2.
CVE-2005-3185 is a stack-based buffer overflow vulnerability.
CVE-2005-3185 allows attackers to execute arbitrary code on a vulnerable system via a long NTLM username.