Логотип exploitDog
bind:"CVE-2009-0547" OR bind:"CVE-2009-0582" OR bind:"CVE-2009-0587"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2009-0547" OR bind:"CVE-2009-0582" OR bind:"CVE-2009-0587"

Количество 24

Количество 24

nvd логотип

CVE-2009-0582

больше 16 лет назад

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

CVSS2: 5.8
EPSS: Низкий
debian логотип

CVE-2009-0582

больше 16 лет назад

The ntlm_challenge function in the NTLM SASL authentication mechanism ...

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-f284-536x-2f8v

около 3 лет назад

Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.

EPSS: Низкий
github логотип

GHSA-8ccp-gg5r-vjf4

около 3 лет назад

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2009-0582

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

CVSS2: 5.8
3%
Низкий
больше 16 лет назад
debian логотип
CVE-2009-0582

The ntlm_challenge function in the NTLM SASL authentication mechanism ...

CVSS2: 5.8
3%
Низкий
больше 16 лет назад
github логотип
GHSA-f284-536x-2f8v

Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.

2%
Низкий
около 3 лет назад
github логотип
GHSA-8ccp-gg5r-vjf4

The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.

3%
Низкий
около 3 лет назад

Уязвимостей на страницу