Affected versions
<= 2.0.0
Impact
- Out of bound read in
ntlm_read_ntlm_v2_client_challenge reads up to 28 bytes out of bound to an internal structure.
- All clients and servers using
NTLM authentication
- Impact low due to a following check being triggered and further processing of data is aborted.
Patches
Upgrade to 2.1.0 or newer
References
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
Impact
ntlm_read_ntlm_v2_client_challengereads up to 28 bytes out of bound to an internal structure.NTLMauthenticationPatches
Upgrade to
2.1.0or newerReferences