CVE-2019-17455

Priority
Description
Libntlm through 1.5 relies on a fixed buffer size for tSmbNtlmAuthRequest,
tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse read and write operations,
as demonstrated by a stack-based buffer over-read in
buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM request.
Notes
ebarrettoNo fix available as of 2019-12-04
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.04 (Disco Dingo):ignored (reached end-of-life)
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-01-23 20:49:09 UTC (commit b4629892d998f2ede31f59bb7508dc50a92ac664)