Red Hat Bugzilla – Bug 170682
CAN-2005-3185 NTLM buffer overflow
Last modified: 2007-11-30 17:11:15 EST
+++ This bug was initially created as a clone of Bug #170678 +++
This text was scavanged from the libcurl advisory:
libcurl's NTLM function can overflow a stack-based buffer if given a too long
user name or domain name. This would happen if you enable NTLM authentication
A - pass in a user name and domain name to libcurl that together are longer
than 192 bytes
B - allow (lib)curl to follow HTTP "redirects" (Location: and the appropriate
HTTP 30x response code) and the new URL contains a URL with a user name
and domain name that together are longer than 192 bytes
-- Additional comment from firstname.lastname@example.org on 2005-10-13 13:24 EST --
Created an attachment (id=119931)
Proposed patch from upstream
This issue also affects FC3
On Fedora Core 4 this is not a security issue; curl is compiled using
-D_FORTIFY_SOURCE=2 which catches and blocks this issue. Therefore on Fedora
Core 4 this can only result in the program being aborted, which is not classed
as a security issue.
Please make a note of this in the advisory of any FC4 update to curl.
This bug is fixed in the last fc3 version.