Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://seclists.org/oss-sec/2012/q3/232 | mailing-list x_refsource_MLIST |
| http://seclists.org/oss-sec/2012/q3/230 | mailing-list x_refsource_MLIST |
| http://www.securityfocus.com/bid/54987 | vdb-entry x_refsource_BID |
| https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail | x_refsource_CONFIRM |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html | vendor-advisory x_refsource_FEDORA |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html | vendor-advisory x_refsource_FEDORA |
| http://www.fetchmail.info/fetchmail-SA-2012-02.txt | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://seclists.org/oss-sec/2012/q3/232 | mailing-list x_refsource_MLIST x_transferred |
| http://seclists.org/oss-sec/2012/q3/230 | mailing-list x_refsource_MLIST x_transferred |
| http://www.securityfocus.com/bid/54987 | vdb-entry x_refsource_BID x_transferred |
| https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail | x_refsource_CONFIRM x_transferred |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088871.html | vendor-advisory x_refsource_FEDORA x_transferred |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-October/088836.html | vendor-advisory x_refsource_FEDORA x_transferred |
| http://www.fetchmail.info/fetchmail-SA-2012-02.txt | x_refsource_CONFIRM x_transferred |
Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 5.8 | MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:P |
| Primary | 2.0 | 5.8 | MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:P |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-noinfo | Primary | nvd@nist.gov |