[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112994

 
 

909

 
 

87812

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2009-0582Date: (C)2009-03-14   (M)2018-06-20


The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.8
Exploit Score: 8.6
Impact Score: 4.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECTRACK-1021845
BID-34109
SECUNIA-34286
SECUNIA-34338
SECUNIA-34339
SECUNIA-34348
SECUNIA-34363
SECUNIA-35065
SECUNIA-35357
OSVDB-52673
ADV-2009-0716
DSA-1813
FEDORA-2009-2784
FEDORA-2009-2792
MDVSA-2009:078
RHSA-2009:0354
RHSA-2009:0355
RHSA-2009:0358
SUSE-SR:2009:010
http://mail.gnome.org/archives/release-team/2009-March/msg00096.html
evolution-ntlmsasl-info-disclosure(49233)
https://bugzilla.redhat.com/show_bug.cgi?id=487685

CWE    1
CWE-20
OVAL    21
oval:org.secpod.oval:def:300653
oval:org.secpod.oval:def:202807
oval:org.secpod.oval:def:101806
oval:org.secpod.oval:def:101819
...

© SecPod Technologies