First published: Fri Feb 27 2009(Updated: )
It was discovered that camel's NTLM SASL authentication mechanism did not properly validate server's challenge packets (NTLM authentication type 2 packets, [1]). In the ntlm_challenge() in camel/camel-sasl-ntlm.c, length of the domain string that was copied from type 2 to type 3 packet (client's reply to server's challenge) was not properly validated against the rest of the data received from the server. 127 ntlm_set_string (ret, NTLM_RESPONSE_DOMAIN_OFFSET, 128 token->data + NTLM_CHALLENGE_DOMAIN_OFFSET, 129 atoi (token->data + NTLM_CHALLENGE_DOMAIN_LEN_OFFSET)); Server could specify larger length than the actual data sent in the packet, causing the client to disclose portion of its memory, or crash. Note: length value was not properly extracted from the packet too, as it is not passed as string, rather as 16-bit LE value. [1] <a href="http://curl.haxx.se/rfc/ntlm.html#theType2Message">http://curl.haxx.se/rfc/ntlm.html#theType2Message</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Apache Camel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-487685 is considered critical due to the improper validation of NTLM SASL authentication challenge packets.
To fix REDHAT-BUG-487685, update Apache Camel to the latest version that addresses this vulnerability.
REDHAT-BUG-487685 affects systems using the Apache Camel NTLM SASL authentication mechanism.
REDHAT-BUG-487685 is an authentication vulnerability related to improper validation of challenge packets.
Yes, REDHAT-BUG-487685 is potentially exploitable remotely due to the nature of the NTLM authentication process.