HTTP: Large Authentication Response
This signature detects overly long NTLM authentication responses. A malicious server can respond with a large HTTP header to overflow client-side buffers. Several versions of cURL are vulnerable to this type of attack. A successful attack can allow code execution.
Extended Description
It has been reported that cURL and libcURL are vulnerable to a remotely exploitable stack-based buffer overflow vulnerability. The cURL and libcURL NTML response processing code fails to ensure that a buffer overflow cannot occur when response data is decoded. The overflow occurs in the stack region, and remote code execution is possible if the saved instruction pointer is overwritten with a pointer to embedded instructions.
Affected Products
F5 3-dns,Suse linux_desktop
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Suse
F5
Gentoo
Sgi
Daniel_stenberg
Mandriva
Alt_linux
5.1