Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3482

Опубликовано: 21 дек. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5.8

Описание

Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

6.3.26-1
cosmic

ignored

end of life
devel

not-affected

6.3.26-1
disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
esm-infra/bionic

not-affected

6.3.26-1
esm-infra/focal

not-affected

6.3.26-1
esm-infra/xenial

not-affected

6.3.26-1

Показывать по

EPSS

Процентиль: 77%
0.01081
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.

nvd
больше 12 лет назад

Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.

debian
больше 12 лет назад

Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debu ...

suse-cvrf
больше 9 лет назад

Security update for fetchmail

github
около 3 лет назад

Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.

EPSS

Процентиль: 77%
0.01081
Низкий

5.8 Medium

CVSS2