MEDIUM · 5.8

CVE-2009-0582

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earli...

Vulnerability Description

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

CVSS Score

5.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:P
Confidentiality
PARTIAL
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
GnomeEvolution-Data-Server<= 2.24.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2009-0582?

CVE-2009-0582 is a vulnerability with a CVSS score of 5.8 (MEDIUM). The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earli...

How severe is CVE-2009-0582?

CVE-2009-0582 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2009-0582?

Check the references section above for vendor advisories and patch information. Affected products include: Gnome Evolution-Data-Server.