Bug 1123371 - (CVE-2018-16890) VUL-1: CVE-2018-16890: curl: NTLM type-2 out-of-bounds buffer read
(CVE-2018-16890)
VUL-1: CVE-2018-16890: curl: NTLM type-2 out-of-bounds buffer read
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/223835/
CVSSv3:SUSE:CVE-2018-16890:3.1:(AV:N/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-01-28 15:16 UTC by Alexandros Toptsoglou
Modified: 2020-07-10 13:28 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 4 Marcus Meissner 2019-01-29 06:26:35 UTC
CVE-2018-16890
Comment 6 Marcus Meissner 2019-02-06 07:45:59 UTC
is public now

NTLM type-2 out-of-bounds buffer read
=====================================

Project curl Security Advisory, February 6th 2019 -
[Permalink](https://curl.haxx.se/docs/CVE-2018-16890.html)

VULNERABILITY
-------------

libcurl contains a heap buffer out-of-bounds read flaw.

The function handling incoming NTLM type-2 messages
(`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data
correctly and is subject to an integer overflow vulnerability.

Using that overflow, a malicious or broken NTLM server could trick libcurl to
accept a bad length + offset combination that would lead to a buffer read
out-of-bounds.

We are not aware of any exploit of this flaw.

INFO
----

This bug was introduced in [commit
86724581b6c](https://github.com/curl/curl/commit/86724581b6c), January 2014.

The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2018-16890 to this issue.

CWE-125: Out-of-bounds Read

Severity: 5.3 (Medium)

AFFECTED VERSIONS
-----------------

- Affected versions: libcurl 7.36.0 to and including 7.63.0
- Not affected versions: libcurl < 7.36.0 and >= 7.64.0

libcurl is used by many applications, but not always advertised as such.

THE SOLUTION
------------

A [patch for CVE-2018-16890](https://github.com/curl/curl/commit/b780b30d1377adb10bbe774835f49e9b237fb9bb)

RECOMMENDATIONS
---------------

We suggest you take one of the following actions immediately, in order of
preference:

  A - Upgrade curl to version 7.64.0

  B - Apply the patch to your version and rebuild

  C - Turn off NTLM authentication

TIME LINE
---------

It was reported to the curl project on December 30, 2018. We contacted
distros@openwall on January 28.

curl 7.64.0 was released on February 6 2019, coordinated with the publication
of this advisory.

CREDITS
-------

Reported by Wenxiang Qian of Tencent Blade Team. Patch by Daniel Stenberg.

Thanks a lot!

-- 

  / daniel.haxx.se
RECOMMENDATIONS
---------------

We suggest you take one of the following actions immediately, in order of
preference:

  A - Upgrade curl to version 7.64.0

  B - Apply the patch to your version and rebuild

  C - Turn off NTLM authentication

TIME LINE
---------

It was reported to the curl project on December 30, 2018. We contacted
distros@openwall on January 28.

curl 7.64.0 was released on February 6 2019, coordinated with the publication
of this advisory.

CREDITS
-------

Reported by Wenxiang Qian of Tencent Blade Team. Patch by Daniel Stenberg.

Thanks a lot!

-- 

  / daniel.haxx.se
Comment 7 Swamp Workflow Management 2019-02-06 11:10:51 UTC
SUSE-SU-2019:0248-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1123371,1123377,1123378
CVE References: CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Sources used:
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    curl-mini-7.60.0-3.17.1
SUSE Linux Enterprise Module for Basesystem 15 (src):    curl-7.60.0-3.17.1
Comment 8 Pedro Monreal Gonzalez 2019-02-06 11:29:03 UTC
Updated to 7.64.0 in Factory:
https://build.opensuse.org/request/show/672083
Comment 9 Swamp Workflow Management 2019-02-06 14:54:32 UTC
SUSE-SU-2019:0249-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1123371,1123377,1123378
CVE References: CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Sources used:
SUSE OpenStack Cloud 7 (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Software Development Kit 12-SP3 (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Server for SAP 12-SP2 (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Server 12-SP3 (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Server 12-SP2-LTSS (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Server 12-SP1-LTSS (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Server 12-LTSS (src):    curl-7.37.0-37.34.1
SUSE Linux Enterprise Desktop 12-SP3 (src):    curl-7.37.0-37.34.1
SUSE Enterprise Storage 4 (src):    curl-7.37.0-37.34.1
SUSE CaaS Platform ALL (src):    curl-7.37.0-37.34.1
SUSE CaaS Platform 3.0 (src):    curl-7.37.0-37.34.1
OpenStack Cloud Magnum Orchestration 7 (src):    curl-7.37.0-37.34.1
Comment 10 Pedro Monreal Gonzalez 2019-02-07 12:11:23 UTC
Submitted to SUSE:SLE-12-SP4:Update:
https://build.suse.de/request/show/183785
Comment 13 Swamp Workflow Management 2019-02-13 11:11:43 UTC
SUSE-SU-2019:0339-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1112758,1113029,1113660,1123371,1123377,1123378
CVE References: CVE-2018-16839,CVE-2018-16840,CVE-2018-16842,CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    curl-7.60.0-4.3.1
SUSE Linux Enterprise Server 12-SP4 (src):    curl-7.60.0-4.3.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    curl-7.60.0-4.3.1
Comment 14 Swamp Workflow Management 2019-02-14 14:09:23 UTC
openSUSE-SU-2019:0173-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1123371,1123377,1123378
CVE References: CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Sources used:
openSUSE Leap 42.3 (src):    curl-7.37.0-45.1
Comment 15 Swamp Workflow Management 2019-02-14 14:11:17 UTC
openSUSE-SU-2019:0174-1: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1123371,1123377,1123378
CVE References: CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Sources used:
openSUSE Leap 15.0 (src):    curl-7.60.0-lp150.2.18.1, curl-mini-7.60.0-lp150.2.18.1
Comment 16 Swamp Workflow Management 2019-04-12 10:12:10 UTC
SUSE-SU-2019:0249-2: An update that fixes three vulnerabilities is now available.

Category: security (important)
Bug References: 1123371,1123377,1123378
CVE References: CVE-2018-16890,CVE-2019-3822,CVE-2019-3823
Sources used:
SUSE Linux Enterprise Server for SAP 12-SP1 (src):    curl-7.37.0-37.34.1

*** NOTE: This information is not intended to be used for external
    communication, because this may only be a partial fix.
    If you have questions please reach out to maintenance coordination.
Comment 19 Alexandros Toptsoglou 2020-07-10 13:28:36 UTC
Done
Comment 20 Alexandros Toptsoglou 2020-07-10 13:28:49 UTC
.