Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.
Fri, 09 Jan 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in libsoup's NTLM (NT LAN Manager) authentication module. When NTLM authentication is enabled, a local attacker can exploit a stack-based buffer overflow vulnerability in the md4sum() function. This allows the attacker to overwrite adjacent memory, which may result in arbitrary code execution with the privileges of the affected application. | A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk. |
Fri, 09 Jan 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Libsoup: libsoup: arbitrary code execution via stack-based buffer overflow in ntlm authentication | Libsoup: signed to unsigned conversion error leading to stack-based buffer overflow in libsoup ntlm authentication |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 09 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 08 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in libsoup's NTLM (NT LAN Manager) authentication module. When NTLM authentication is enabled, a local attacker can exploit a stack-based buffer overflow vulnerability in the md4sum() function. This allows the attacker to overwrite adjacent memory, which may result in arbitrary code execution with the privileges of the affected application. | |
| Title | Libsoup: libsoup: arbitrary code execution via stack-based buffer overflow in ntlm authentication | |
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| Weaknesses | CWE-121 | |
| CPEs | cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-01-09T05:45:12.939Z
Reserved: 2026-01-08T12:12:33.130Z
Link: CVE-2026-0719
Updated: 2026-01-08T14:31:28.400Z
Status : Awaiting Analysis
Published: 2026-01-08T13:15:43.283
Modified: 2026-01-09T06:16:01.187
Link: CVE-2026-0719
OpenCVE Enrichment
No data.