Lucene search

K
nvd[email protected]NVD:CVE-2013-4122
HistoryOct 27, 2013 - 12:55 a.m.

CVE-2013-4122

2013-10-2700:55:03
CWE-189
web.nvd.nist.gov

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

6.5 Medium

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

82.2%

Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference.

Affected configurations

NVD
Node
cmucyrus-saslRange≀2.1.26
OR
cmucyrus-saslMatch1.5.28
OR
cmucyrus-saslMatch2.1.19
OR
cmucyrus-saslMatch2.1.20
OR
cmucyrus-saslMatch2.1.21
OR
cmucyrus-saslMatch2.1.22
OR
cmucyrus-saslMatch2.1.23
OR
cmucyrus-saslMatch2.1.24
OR
cmucyrus-saslMatch2.1.25
AND
gnuglibcMatch2.2
OR
gnuglibcMatch2.2.1
OR
gnuglibcMatch2.2.2
OR
gnuglibcMatch2.2.3
OR
gnuglibcMatch2.2.4
OR
gnuglibcMatch2.2.5
OR
gnuglibcMatch2.3
OR
gnuglibcMatch2.3.1
OR
gnuglibcMatch2.3.2
OR
gnuglibcMatch2.3.3
OR
gnuglibcMatch2.3.4
OR
gnuglibcMatch2.3.5
OR
gnuglibcMatch2.3.6
OR
gnuglibcMatch2.3.10
OR
gnuglibcMatch2.4
OR
gnuglibcMatch2.5
OR
gnuglibcMatch2.5.1
OR
gnuglibcMatch2.6
OR
gnuglibcMatch2.6.1
OR
gnuglibcMatch2.7
OR
gnuglibcMatch2.8
OR
gnuglibcMatch2.9
OR
gnuglibcMatch2.17
OR
gnuglibcMatch2.18

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

6.5 Medium

AI Score

Confidence

High

0.008 Low

EPSS

Percentile

82.2%