First published: Mon Aug 27 2018(Updated: )
curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication code. The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap. The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. (This bug is almost identical to CVE-2017-8816.)
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/curl | <0:7.29.0-51.el7_6.3 | 0:7.29.0-51.el7_6.3 |
redhat/httpd24-curl | <0:7.61.1-1.el6 | 0:7.61.1-1.el6 |
redhat/httpd24-httpd | <0:2.4.34-7.el6 | 0:2.4.34-7.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el6 | 0:1.7.1-7.el6 |
redhat/httpd24-curl | <0:7.61.1-1.el7 | 0:7.61.1-1.el7 |
redhat/httpd24-httpd | <0:2.4.34-7.el7 | 0:2.4.34-7.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-7.el7 | 0:1.7.1-7.el7 |
Haxx Libcurl | <7.61.1 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
redhat/curl | <7.61.1 | 7.61.1 |
ubuntu/curl | <7.58.0-2ubuntu3.3 | 7.58.0-2ubuntu3.3 |
ubuntu/curl | <7.35.0-1ubuntu2.17 | 7.35.0-1ubuntu2.17 |
ubuntu/curl | <7.47.0-1ubuntu2.9 | 7.47.0-1ubuntu2.9 |
debian/curl | 7.74.0-1.3+deb11u12 7.74.0-1.3+deb11u11 7.88.1-10+deb12u6 7.88.1-10+deb12u5 8.8.0-4 8.9.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-14618 is a vulnerability in the NTLM authentication code of curl before version 7.61.1.
CVE-2018-14618 has a severity value of 9.8, which is classified as critical.
CVE-2018-14618 affects curl versions before 7.61.1, and it is specifically related to a buffer overrun in the NTLM authentication code.
To fix CVE-2018-14618, you need to update curl to version 7.61.1 or later.
You can find more information about CVE-2018-14618 on the official curl website and the Red Hat security page.