First published: Thu Oct 13 2005(Updated: )
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wget Wget | =1.10 | |
libcurl libcurl | =7.13.2 | |
Curl Curl | =7.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.