Overview
The Cyrus SASL library contains a buffer overflow vulnerability that could allow an attacker to execute code or cause a vulnerable program to crash.
Description
SASL (Simple Authentication and Security Layer) is a method for adding authentication support to various protocols. SASL is commonly used by mail servers to request authentication from clients and by clients to authenticate to servers. The sasl_encode64() function converts a string into base64. The Cyrus SASL library contains buffer overflows that occur because of unsafe use of the sasl_encode64() function. |
Impact
A remote attacker might be able to execute code, or cause any programs relying on SASL to crash or be unavailable. |
Solution
Upgrade |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to James Ralston for reporting this issue and providing technical information.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2009-0688 |
Severity Metric: | 4.04 |
Date Public: | 2009-04-08 |
Date First Published: | 2009-05-14 |
Date Last Updated: | 2009-08-26 13:19 UTC |
Document Revision: | 24 |