Bugzilla – Bug 1160462
VUL-0: CVE-2019-19977: libesmtp: stack-based buffer over-read in ntlm_build_type_2() in ntlm/ntlmstruct.c
Last modified: 2021-10-20 07:51:19 UTC
CVE-2019-19977 libESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read. References: https://github.com/Kirin-say/Vulnerabilities/blob/master/Stack_Overflow_in_libesmtp.md https://github.com/jbouse-debian/libesmtp/blob/ca5bd0800ef1da234315da4c59716568eb5e6402/ntlm/ntlmstruct.c#L228-L242 References: https://bugzilla.redhat.com/show_bug.cgi?id=1788744 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-19977 http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-19977.html https://github.com/jbouse-debian/libesmtp/blob/ca5bd0800ef1da234315da4c59716568eb5e6402/ntlm/ntlmstruct.c#L228-L242 https://github.com/Kirin-say/Vulnerabilities/blob/master/Stack_Overflow_in_libesmtp.md http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19977 https://web.archive.org/web/20190528215510/http://brianstafford.info/libesmtp/
This is an autogenerated message for OBS integration: This bug (1160462) was mentioned in https://build.opensuse.org/request/show/910457 Factory / libesmtp
# maintenance_jira_update_notice SUSE-SU-2021:14793-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1160462,1189097 CVE References: CVE-2019-19977 JIRA References: Sources used: SUSE Linux Enterprise Server 11-SP4-LTSS (src): libesmtp-1.0.4-157.18.3.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): libesmtp-1.0.4-157.18.3.1 SUSE Linux Enterprise Debuginfo 11-SP4 (src): libesmtp-1.0.4-157.18.3.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): libesmtp-1.0.4-157.18.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice SUSE-SU-2021:2917-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1160462,1189097 CVE References: CVE-2019-19977 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): libesmtp-1.0.6-17.3.1 SUSE OpenStack Cloud Crowbar 8 (src): libesmtp-1.0.6-17.3.1 SUSE OpenStack Cloud 9 (src): libesmtp-1.0.6-17.3.1 SUSE OpenStack Cloud 8 (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Software Development Kit 12-SP5 (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server for SAP 12-SP4 (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server for SAP 12-SP3 (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server 12-SP5 (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server 12-SP4-LTSS (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server 12-SP3-LTSS (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server 12-SP3-BCL (src): libesmtp-1.0.6-17.3.1 SUSE Linux Enterprise Server 12-SP2-BCL (src): libesmtp-1.0.6-17.3.1 HPE Helion Openstack 8 (src): libesmtp-1.0.6-17.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice SUSE-SU-2021:2937-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1160462,1189097 CVE References: CVE-2019-19977 JIRA References: Sources used: SUSE MicroOS 5.0 (src): libesmtp-1.0.6-150.4.1 SUSE Manager Server 4.0 (src): libesmtp-1.0.6-150.4.1 SUSE Manager Retail Branch Server 4.0 (src): libesmtp-1.0.6-150.4.1 SUSE Manager Proxy 4.0 (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Server for SAP 15 (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Server 15-LTSS (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Module for Basesystem 15-SP3 (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise Module for Basesystem 15-SP2 (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): libesmtp-1.0.6-150.4.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): libesmtp-1.0.6-150.4.1 SUSE Enterprise Storage 6 (src): libesmtp-1.0.6-150.4.1 SUSE CaaS Platform 4.0 (src): libesmtp-1.0.6-150.4.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice openSUSE-SU-2021:2937-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1160462,1189097 CVE References: CVE-2019-19977 JIRA References: Sources used: openSUSE Leap 15.3 (src): libesmtp-1.0.6-150.4.1
# maintenance_jira_update_notice openSUSE-SU-2021:1235-1: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1160462,1189097 CVE References: CVE-2019-19977 JIRA References: Sources used: openSUSE Leap 15.2 (src): libesmtp-1.0.6-lp152.4.3.1
# maintenance_jira_update_notice SUSE-SU-2021:2937-2: An update that solves one vulnerability and has one errata is now available. Category: security (important) Bug References: 1160462,1189097 CVE References: CVE-2019-19977 JIRA References: Sources used: SUSE MicroOS 5.1 (src): libesmtp-1.0.6-150.4.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
reelased