Vigil@nce: GNOME Evolution, denial of service via NTLM SASL
March 2009 by Vigil@nce
SYNTHESIS OF THE VULNERABILITY
A malicious server can stop the GNOME Evolution client.
Gravity: 1/4
Consequences: denial of service of client
Provenance: intranet server
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 16/03/2009
IMPACTED PRODUCTS
– Red Hat Enterprise Linux
– Unix - plateform
DESCRIPTION OF THE VULNERABILITY
The GNOME Evolution messaging client supports various
authentication types.
When GNOME Evolution connects to a server using an NTLM SASL
authentication, the ntlm_challenge() function of the
camel/camel-sasl-ntlm.c file reads data coming from the server.
However, if the server indicates a value too large in its message,
GNOME Evolution tries to read past the end of data, which stops it.
A malicious server can thus stop the GNOME Evolution client.
CHARACTERISTICS
Identifiers: BID-34109, CVE-2009-0582, RHSA-2009:0354-01,
RHSA-2009:0355-01, RHSA-2009:0358-01, VIGILANCE-VUL-8539
http://vigilance.fr/vulnerability/GNOME-Evolution-denial-of-service-via-NTLM-SASL-8539