[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0582

Date: (C)2009-03-14   (M)2017-11-18 


The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

CVSS Score: 5.8Access Vector: NETWORK
Exploit Score: 8.6Access Complexity: MEDIUM
Impact Score: 4.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: PARTIAL





Reference:
SECTRACK-1021845
BID-34109
SECUNIA-34286
SECUNIA-34338
SECUNIA-34339
SECUNIA-34348
SECUNIA-34363
SECUNIA-35065
SECUNIA-35357
OSVDB-52673
ADV-2009-0716
DSA-1813
FEDORA-2009-2784
FEDORA-2009-2792
MDVSA-2009:078
RHSA-2009:0354
RHSA-2009:0355
RHSA-2009:0358
SUSE-SR:2009:010
http://mail.gnome.org/archives/release-team/2009-March/msg00096.html
evolution-ntlmsasl-info-disclosure(49233)
https://bugzilla.redhat.com/show_bug.cgi?id=487685

CWE    1
CWE-20
OVAL    21
oval:org.secpod.oval:def:300653
oval:org.secpod.oval:def:101806
oval:org.secpod.oval:def:101819
oval:org.secpod.oval:def:500543
...

© 2013 SecPod Technologies