A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash.
A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash.
Upstream patches: gitorious. org/fetchmail/ fetchmail/ commit/ 3fbc7cd331602c7 6f882d1b507cd05 c1d824ba8b /gitorious. org/fetchmail/ fetchmail/ commit/ c189f6a54f36f5b 6f7734303db3cfc 52311aab5f /gitorious. org/fetchmail/ fetchmail/ commit/ b3e0cd2d558b5cc f06c816eed38c88 3d7462d3d4
[1] http://
[1a] https:/
[1b] https:/
Upstream advisory (not available yet): www.fetchmail. info/fetchmail- SA-2012- 02.txt
[2] http://
CVE request: www.openwall. com/lists/ oss-security/ 2012/08/ 13/9
[3] http://
References: /bugs.gentoo. org/show_ bug.cgi? id=431284
[4] https:/