CVE-2019-19977

NameCVE-2019-19977
DescriptionlibESMTP through 1.0.6 mishandles domain copying into a fixed-size buffer in ntlm_build_type_2 in ntlm/ntlmstruct.c, as demonstrated by a stack-based buffer over-read.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libesmtp (PTS)jessie1.0.6-4vulnerable
stretch1.0.6-4.2vulnerable
buster, bullseye1.0.6-4.3vulnerable
bookworm1.1.0-3.1~deb12u1vulnerable
sid, trixie1.1.0-3.2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libesmtpsource(unstable)(unfixed)unimportant

Notes

https://github.com/Kirin-say/Vulnerabilities/blob/master/Stack_Overflow_in_libesmtp.md
NTLM support not enabled in the Debian builds.

Search for package or bug name: Reporting problems