Lucene search

K
nvd[email protected]NVD:CVE-2009-0582
HistoryMar 14, 2009 - 6:30 p.m.

CVE-2009-0582

2009-03-1418:30:00
CWE-20
web.nvd.nist.gov
1

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

6.4 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

66.5%

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

Affected configurations

NVD
Node
gnomeevolution-data-serverRange≤2.24.5
OR
gnomeevolution-data-serverMatch2.25.92

References

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:N/A:P

6.4 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

66.5%