Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce: GNOME Evolution, denial of service via NTLM SASL

March 2009 by Vigil@nce

SYNTHESIS OF THE VULNERABILITY

A malicious server can stop the GNOME Evolution client.

Gravity: 1/4

Consequences: denial of service of client

Provenance: intranet server

Means of attack: no proof of concept, no attack

Ability of attacker: expert (4/4)

Confidence: confirmed by the editor (5/5)

Diffusion of the vulnerable configuration: high (3/3)

Creation date: 16/03/2009

IMPACTED PRODUCTS

 Red Hat Enterprise Linux
 Unix - plateform

DESCRIPTION OF THE VULNERABILITY

The GNOME Evolution messaging client supports various
authentication types.

When GNOME Evolution connects to a server using an NTLM SASL
authentication, the ntlm_challenge() function of the
camel/camel-sasl-ntlm.c file reads data coming from the server.
However, if the server indicates a value too large in its message,
GNOME Evolution tries to read past the end of data, which stops it.

A malicious server can thus stop the GNOME Evolution client.

CHARACTERISTICS

Identifiers: BID-34109, CVE-2009-0582, RHSA-2009:0354-01,
RHSA-2009:0355-01, RHSA-2009:0358-01, VIGILANCE-VUL-8539
http://vigilance.fr/vulnerability/GNOME-Evolution-denial-of-service-via-NTLM-SASL-8539


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts