CVE-2009-0582

Impact:
Moderate
Public Date:
2009-03-12
Bugzilla:
487685: CVE-2009-0582 evolution-data-server: insufficient checking of NTLM authentication challenge packets

The MITRE CVE dictionary describes this issue as:

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

Find out more about CVE-2009-0582 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:N/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 3 (evolution) RHSA-2009:0358 2009-03-16
Red Hat Enterprise Linux 5 (evolution-data-server) RHSA-2009:0354 2009-03-16
Red Hat Enterprise Linux 4 RHSA-2009:0355 2009-03-16
Red Hat Enterprise Linux 4 (evolution28-evolution-data-server) RHSA-2009:0354 2009-03-16

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.