Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2009-0582

Back to Search

SUSE Linux Security Vulnerability: CVE-2009-0582

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:P)
Published
03/14/2009
Created
07/25/2018
Added
02/17/2015
Modified
07/04/2017

Description

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

Solution(s)

  • suse-upgrade-evolution
  • suse-upgrade-evolution-data-server
  • suse-upgrade-evolution-data-server-32bit
  • suse-upgrade-evolution-data-server-64bit
  • suse-upgrade-evolution-data-server-devel
  • suse-upgrade-evolution-data-server-doc
  • suse-upgrade-evolution-data-server-lang
  • suse-upgrade-evolution-devel
  • suse-upgrade-evolution-lang
  • suse-upgrade-evolution-mono-providers
  • suse-upgrade-evolution-pilot
  • suse-upgrade-gtkhtml2
  • suse-upgrade-gtkhtml2-devel
  • suse-upgrade-gtkhtml2-lang

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;