This is a security patch release to address a potential Denial of Service vulnerability:
-
The NTLM analyzer did not properly handle AV Pair sequences
that were either empty or unterminated, resulting in invalid
memory access or heap buffer over-read. The NTLM analyzer
is enabled by default and used in the analysis of SMB,
DCE/RPC, and GSSAPI protocols.Thanks to Chris Hinshaw for reporting the issue.