Lucene search

K
gentooGentoo FoundationGLSA-200907-09
HistoryJul 12, 2009 - 12:00 a.m.

Cyrus-SASL: Execution of arbitrary code

2009-07-1200:00:00
Gentoo Foundation
security.gentoo.org
17

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.407 Medium

EPSS

Percentile

97.3%

Background

Cyrus-SASL is an implementation of the Simple Authentication and Security Layer.

Description

James Ralston reported that in certain situations, Cyrus-SASL does not properly terminate strings which can result in buffer overflows when performing Base64 encoding.

Impact

A remote unauthenticated user might send specially crafted packets to a daemon using Cyrus-SASL, possibly resulting in the execution of arbitrary code with the privileges of the user running the daemon or a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All Cyrus-SASL users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.23"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-libs/cyrus-sasl< 2.1.23UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.407 Medium

EPSS

Percentile

97.3%