Bug 1622707 (CVE-2018-14618)
Summary: | CVE-2018-14618 curl: NTLM password overflow via integer overflow | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abhgupta, bodavis, csutherl, dbaker, dbhole, drusek, gzaronik, hhorak, jclere, john.j5live, jokerman, jorton, kanderso, kdudka, lgao, luhliari, mbabacek, mturk, myarboro, omajid, paul, rwagner, security-response-team, sthangav, trankin, twalsh, weli |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | curl 7.61.1 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-12 13:05:57 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1623697, 1623698, 1625563, 1625564, 1714209 | ||
Bug Blocks: | 1622708 |
Description
Pedro Sampaio
2018-08-27 19:40:19 UTC
No dice using a crafted .netrc or inputting large values in the password prompt that pops up if -u is passed in. Tried triggering this directly via setting a 2GB password through libcurl (res = curl_easy_setopt(curl, CURLOPT_PASSWORD, pass) on a 32-bit system. Unfortunately, curl_easy_setopt for CURLOPT_PASSWORD does a strdup, which naturally fails. Curl then returns out of memory before hitting the target code. So this flaw may be possible to hit on 32-bit, but I'm unclear how. There needs to be a code path that directly takes user input without copying it. May exist, but I've looked down five or so avenues and haven't found it yet. The code does show a pretty trivial heap overflow, but getting there seems mildly difficult. Acknowledgments: Name: the Curl project Upstream: Zhaoyang Wu External References: https://curl.haxx.se/docs/CVE-2018-14618.html Public via: https://seclists.org/oss-sec/2018/q3/217 Created curl tracking bugs for this issue: Affects: fedora-all [bug 1625563] This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2018:3558 https://access.redhat.com/errata/RHSA-2018:3558 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14618 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1880 https://access.redhat.com/errata/RHSA-2019:1880 |