{"id":"CURL-CVE-2018-16890","summary":"NTLM type-2 out-of-bounds buffer read","details":"libcurl contains a heap buffer out-of-bounds read flaw.\n\nThe function handling incoming NTLM type-2 messages\n(`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data\ncorrectly and is subject to an integer overflow vulnerability.\n\nUsing that overflow, a malicious or broken NTLM server could trick libcurl to\naccept a bad length + offset combination that would lead to a buffer read\nout-of-bounds.","aliases":["CVE-2018-16890"],"modified":"2026-04-25T20:30:29.749285Z","published":"2019-02-06T08:00:00Z","database_specific":{"severity":"Medium","URL":"https://curl.se/docs/CVE-2018-16890.json","affects":"both","www":"https://curl.se/docs/CVE-2018-16890.html","package":"curl","CWE":{"id":"CWE-125","desc":"Out-of-bounds Read"},"last_affected":"7.63.0"},"affected":[{"ranges":[{"type":"SEMVER","events":[{"introduced":"7.36.0"},{"fixed":"7.64.0"}]},{"type":"GIT","repo":"https://github.com/curl/curl.git","events":[{"introduced":"86724581b6c02d160b52f817550cfdfc9c93af62"},{"fixed":"b780b30d1377adb10bbe774835f49e9b237fb9bb"}]}],"versions":["7.63.0","7.62.0","7.61.1","7.61.0","7.60.0","7.59.0","7.58.0","7.57.0","7.56.1","7.56.0","7.55.1","7.55.0","7.54.1","7.54.0","7.53.1","7.53.0","7.52.1","7.52.0","7.51.0","7.50.3","7.50.2","7.50.1","7.50.0","7.49.1","7.49.0","7.48.0","7.47.1","7.47.0","7.46.0","7.45.0","7.44.0","7.43.0","7.42.1","7.42.0","7.41.0","7.40.0","7.39.0","7.38.0","7.37.1","7.37.0","7.36.0"],"database_specific":{"vanir_signatures":[{"id":"CURL-CVE-2018-16890-10e9b890","signature_version":"v1","deprecated":false,"target":{"file":"lib/vauth/ntlm.c"},"digest":{"threshold":0.9,"line_hashes":["12728682252783882915865415916745410219","260038441391679011891052480260443053264","304498700439191242831503511784071893196","248163854096766719562619899192948860617","258592839919068071494480859323354185920","65831133836082554303220208869811168717","5459699787853170582943844525295317240","40134995311612953874905870103359729622"]},"signature_type":"Line","source":"https://github.com/curl/curl.git/commit/b780b30d1377adb10bbe774835f49e9b237fb9bb"},{"id":"CURL-CVE-2018-16890-a78e5ad3","signature_version":"v1","deprecated":false,"target":{"function":"ntlm_decode_type2_target","file":"lib/vauth/ntlm.c"},"digest":{"function_hash":"167555698249115182477771298620459297773","length":767},"signature_type":"Function","source":"https://github.com/curl/curl.git/commit/b780b30d1377adb10bbe774835f49e9b237fb9bb"}],"vanir_signatures_modified":"2026-04-25T20:30:29Z","source":"https://curl.se/docs/CURL-CVE-2018-16890.json"}}],"schema_version":"1.7.5","credits":[{"name":"Wenxiang Qian of Tencent Blade Team","type":"FINDER"},{"name":"Daniel Stenberg","type":"REMEDIATION_DEVELOPER"}]}