Files
CVEs-PoC/2005/CVE-2005-3185.md
T
2024-06-18 02:51:15 +02:00

19 lines
835 B
Markdown

### [CVE-2005-3185](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
### POC
#### Reference
- http://securityreason.com/securityalert/82
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
#### Github
No PoCs found on GitHub currently.