FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-03-28 15:43:32 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f4d638b9-e6e5-4dbe-8c70-571dbc116174curl -- password overflow vulnerability

curl security problems:

CVE-2018-14618: NTLM password overflow via integer overflow

The internal function Curl_ntlm_core_mk_nt_hash multiplies the length of the password by two (SUM) to figure out how large temporary storage area to allocate from the heap.

The length value is then subsequently used to iterate over the password and generate output into the allocated storage buffer. On systems with a 32 bit size_t, the math to calculate SUM triggers an integer overflow when the password length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow.

This bug is almost identical to CVE-2017-8816.


Discovery 2018-09-05
Entry 2018-09-05
Modified 2019-08-03
curl
ge 7.15.4 lt 7.61.1

linux-c7-curl
< 7.29.0_6

https://curl.haxx.se/docs/security.html
https://curl.haxx.se/docs/CVE-2018-14618.html
CVE-2018-14618
301a01b7-d50e-11e7-ac58-b499baebfeafcURL -- Multiple vulnerabilities

The cURL project reports:

  • NTLM buffer overflow via integer overflow (CVE-2017-8816)

    libcurl contains a buffer overrun flaw in the NTLM authentication code. The internal function Curl_ntlm_core_mk_ntlmv2_hash sums up the lengths of the user name + password (= SUM) and multiplies the sum by two (= SIZE) to figure out how large storage to allocate from the heap.
  • FTP wildcard out of bounds read (CVE-2017-8817)

    libcurl contains a read out of bounds flaw in the FTP wildcard function. libcurl's FTP wildcard matching feature, which is enabled with the CURLOPT_WILDCARDMATCH option can use a built-in wildcard function or a user provided one. The built-in wildcard function has a flaw that makes it not detect the end of the pattern string if it ends with an open bracket ([) but instead it will continue reading the heap beyond the end of the URL buffer that holds the wildcard.
  • SSL out of buffer access (CVE-2017-8818)

    libcurl contains an out boundary access flaw in SSL related code. When allocating memory for a connection (the internal struct called connectdata), a certain amount of memory is allocated at the end of the struct to be used for SSL related structs. Those structs are used by the particular SSL library libcurl is built to use. The application can also tell libcurl which specific SSL library to use if it was built to support more than one.

Discovery 2017-11-29
Entry 2017-11-29
Modified 2017-12-11
curl
ge 7.21.0 lt 7.57.0

linux-c7-curl
ge 7.21.0 lt 7.29.0_4

https://curl.haxx.se/changes.html
CVE-2017-8816
CVE-2017-8817
CVE-2017-8818