fetchmail -- two vulnerabilities in NTLM authentication

ID 83F9E943-E664-11E1-A66D-080027EF73EC
Type freebsd
Reporter FreeBSD
Modified 2012-08-27T00:00:00


Matthias Andree reports:

With NTLM support enabled, fetchmail might mistake a server-side error message during NTLM protocol exchange for protocol data, leading to a SIGSEGV. Also, with a carefully crafted NTLM challenge, a malicious server might cause fetchmail to read from a bad memory location, betraying confidential data. It is deemed hard, although not impossible, to steal other accounts' data.