3 results (0.004 seconds)

CVSS: 2.6EPSS: 7%CPEs: 5EXPL: 0

digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation. • ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-sasl&msg=7775 http://labs.musecurity.com/advisories/MU-200604-01.txt http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044992.html http://secunia.com/advisories/19618 http://secunia.com/advisories/19753 http://secunia.com/advisories/19809 http://secunia.com/ • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 16EXPL: 0

The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134657 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://marc.info/?l=bugtraq&m=110693126007214&w=2 http://rhn.redhat.com/errata/RHSA-2004-546.html http://www.ciac.org/ciac/bulletins/p-003.shtml http://www.debian.org/security/2004/dsa-563 http://www.debian.org/security/2004/dsa-568 http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.mandriva.com/security/advis •

CVSS: 7.5EPSS: 3%CPEs: 86EXPL: 0

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. • http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.linuxcompatible.org/print42495.html http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html http://www.securityfocus.com/bid/11347 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type •