First published: Thu Oct 10 2019(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libntlm | <=1.5-2<=1.5-1<=1.4-8<=1.4-3 | 1.6-1 1.4-3+deb8u1 |
debian/libntlm | 1.6-3 1.6-4 1.8-3 | |
Nongnu Libntlm | <=1.5 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Red Hat Fedora | =32 | |
Red Hat Fedora | =33 | |
openSUSE Backports | =15.0-sp1 | |
SUSE Linux | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17455 is considered to have a medium severity due to the potential for stack-based buffer over-read vulnerabilities.
To fix CVE-2019-17455, upgrade libntlm to versions 1.6-1 or later.
CVE-2019-17455 affects libntlm versions up to and including 1.5.
Yes, CVE-2019-17455 can be exploited remotely through crafted NTLM requests.
CVE-2019-17455 impacts various distributions including Debian, Ubuntu, and Fedora.