Gentoo Logo

curl: NTLM response buffer overflow


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200503-20 / curl
Release Date March 16, 2005
Latest Revision March 16, 2005: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-misc/curl < 7.13.1 >= 7.13.1 All supported architectures

Related bugreports: #82534


curl is vulnerable to a buffer overflow which could lead to the execution of arbitrary code.

2.  Impact Information


curl is a command line tool for transferring files via many different protocols.


curl fails to properly check boundaries when handling NTLM authentication.


With a malicious server an attacker could send a carefully crafted NTLM response to a connecting client leading to the execution of arbitrary code with the permissions of the user running curl.

3.  Resolution Information


Disable NTLM authentication by not using the --anyauth or --ntlm options.


All curl users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1"

4.  References


Page updated March 16, 2005

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.