jsiwek released this
Aug 29, 2019
· 856 commits to master since this release
This is a security patch release to address a potential Denial of Service vulnerability:
The NTLM analyzer did not properly handle AV Pair sequences that were either empty or unterminated, resulting in invalid memory access or heap buffer over-read. The NTLM analyzer is enabled by default and used in the analysis of SMB, DCE/RPC, and GSSAPI protocols.
Thanks to Chris Hinshaw for reporting the issue.