cURL.libcurl.NTLM.Type-3.Message.Creation.Stack.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in cURL Project libcURL and cURL
A remote attacker could exploit the vulnerability by enticing a target user into running cURL on a malicious URL. Successful exploitation could result in the execution of arbitrary code in the security context of the target user.
Affected Products
cURL Project cURL 7.34.0 to 7.63.0
cURL Project libcURL 7.34.0 to 7.63.0
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://curl.haxx.se/docs/CVE-2019-3822.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:medium:critical |
2019-04-10 | 14.590 | Default_action:pass:drop |
2019-04-02 | 14.584 |