SB2012122102 - Input validation error in fetchmail.berlios.de Fetchmail



SB2012122102 - Input validation error in fetchmail.berlios.de Fetchmail

Published: December 21, 2012 Updated: August 4, 2020

Security Bulletin ID SB2012122102
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Input validation error (CVE-ID: CVE-2012-3482)

The vulnerability allows a remote non-authenticated attacker to #BASIC_IMPACT#.

Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.


Remediation

Install update from vendor's website.