+++ This bug was initially created as a clone of Bug #170678 +++ This text was scavanged from the libcurl advisory: libcurl's NTLM function can overflow a stack-based buffer if given a too long user name or domain name. This would happen if you enable NTLM authentication and either: A - pass in a user name and domain name to libcurl that together are longer than 192 bytes B - allow (lib)curl to follow HTTP "redirects" (Location: and the appropriate HTTP 30x response code) and the new URL contains a URL with a user name and domain name that together are longer than 192 bytes -- Additional comment from bressers on 2005-10-13 13:24 EST -- Created an attachment (id=119931) Proposed patch from upstream
This issue also affects FC3
On Fedora Core 4 this is not a security issue; curl is compiled using -D_FORTIFY_SOURCE=2 which catches and blocks this issue. Therefore on Fedora Core 4 this can only result in the program being aborted, which is not classed as a security issue. Please make a note of this in the advisory of any FC4 update to curl.
This bug is fixed in the last fc3 version.