First published: Sun Oct 06 2019(Updated: )
libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer over-read because soup_ntlm_parse_challenge() in soup-auth-ntlm.c does not properly check an NTLM message's length before proceeding with a memcpy.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME libsoup | >=2.65.1<2.66.4 | |
GNOME libsoup | >=2.67.1<=2.68.1 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
debian/libsoup2.4 | <=2.65.91-1<=2.68.1-2 | |
ubuntu/libsoup2.4 | <2.62.1-1ubuntu0.4 | 2.62.1-1ubuntu0.4 |
ubuntu/libsoup2.4 | <2.66.1-1ubuntu0.1 | 2.66.1-1ubuntu0.1 |
ubuntu/libsoup2.4 | <2.68.2 | 2.68.2 |
debian/libsoup2.4 | 2.72.0-2 2.74.3-1 2.74.3-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-17266 is critical, with a severity value of 9.8.
CVE-2019-17266 can lead to a heap-based buffer over-read vulnerability in libsoup versions 2.65.1 until 2.68.1.
The recommended version to fix CVE-2019-17266 on Ubuntu is libsoup2.4 2.68.2.
You can find more information about CVE-2019-17266 at the following references: [1](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941912), [2](https://github.com/Kirin-say/Vulnerabilities/blob/master/CVE-2019-17266_POC.md), [3](https://gitlab.gnome.org/GNOME/libsoup/commit/88b7dff4467f4151afae244ea7d1223753cd05ab).
The CWE for CVE-2019-17266 is CWE-125.