CVE-2006-1721 – cyrus-sasl digest-md5 DoS
https://notcve.org/view.php?id=CVE-2006-1721
digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation. • ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-sasl&msg=7775 http://labs.musecurity.com/advisories/MU-200604-01.txt http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044992.html http://secunia.com/advisories/19618 http://secunia.com/advisories/19753 http://secunia.com/advisories/19809 http://secunia.com/ • CWE-20: Improper Input Validation •
CVE-2004-0884
https://notcve.org/view.php?id=CVE-2004-0884
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134657 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://marc.info/?l=bugtraq&m=110693126007214&w=2 http://rhn.redhat.com/errata/RHSA-2004-546.html http://www.ciac.org/ciac/bulletins/p-003.shtml http://www.debian.org/security/2004/dsa-563 http://www.debian.org/security/2004/dsa-568 http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.mandriva.com/security/advis •
CVE-2005-0373
https://notcve.org/view.php?id=CVE-2005-0373
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •
CVE-2002-2043
https://notcve.org/view.php?id=CVE-2002-2043
SQL injection vulnerability in the LDAP and MySQL authentication patch for Cyrus SASL 1.5.24 and 1.5.27 allows remote attackers to execute arbitrary SQL commands and log in as arbitrary POP mail users via the password. • http://archives.neohapsis.com/archives/bugtraq/2002-04/0020.html http://www.iss.net/security_center/static/8748.php http://www.securityfocus.com/bid/4409 •