|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for libntlm (DLA-2207-1)|
|Summary:||The remote host is missing an update for the 'libntlm'; package(s) announced via the DLA-2207-1 advisory.|
The remote host is missing an update for the 'libntlm'
package(s) announced via the DLA-2207-1 advisory.
It was discovered that libntlm through 1.5 relies on a fixed buffer
size for tSmbNtlmAuthRequest, tSmbNtlmAuthChallenge, and
read and write operations, as demonstrated by a stack-based buffer
over-read in buildSmbNtlmAuthRequest in smbutil.c for a crafted NTLM
'libntlm' package(s) on Debian Linux.
For Debian 8 'Jessie', this problem has been fixed in version
We recommend that you upgrade your libntlm packages.
Common Vulnerability Exposure (CVE) ID: CVE-2019-17455|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.