libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds. Bug introduced by: https://github.com/curl/curl/commit/86724581b6c
Acknowledgments: Name: Daniel Stenberg (the Curl project) Upstream: Wenxiang Qian (Tencent Blade Team)
External Reference: https://curl.haxx.se/docs/CVE-2018-16890.html Upstream Patch: https://github.com/curl/curl/commit/b780b30d
Created curl tracking bugs for this issue: Affects: fedora-all [bug 1672902]
Mitigation: Turn off NTLM authentication.
Statement: The versions of curl package shipped with Red Hat Enterprise Linux 5, 6, and 7 do not support NTLMv2 type-2 headers, hence they are not affected by this flaw.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:3701 https://access.redhat.com/errata/RHSA-2019:3701
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-16890