Severity |
|
Remote |
|
Type |
+ |
Arbitrary code execution |
|
Description |
+ |
The internal function Curl_auth_create_plain_message fails to correctly verify that the passed in lengths for name and password aren't too long, then calculates a buffer size to allocate. On systems with a 32 bit size_t, the math to calculate the buffer size triggers an integer overflow when the user name length exceeds 2GB (2^31 bytes). This integer overflow usually causes a very small buffer to actually get allocated instead of the intended very huge one, making the use of that buffer end up in a heap buffer overflow. |
|
References |
+ |
https://curl.haxx.se/docs/CVE-2018-16839.html |
+ |
https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5 |
|
Notes |
+ |
32 bit only, not affected. |
|