[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0688

Date: (C)2009-05-15   (M)2017-12-01 


Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.

CVSS Score: 7.5Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
SUNALERT-1020755
SUNALERT-1021699
SECTRACK-1022231
SUNALERT-259148
SUNALERT-264248
SUNALERT-273910
BID-34961
SECUNIA-35094
SECUNIA-35097
SECUNIA-35102
SECUNIA-35206
SECUNIA-35239
SECUNIA-35321
SECUNIA-35416
SECUNIA-35497
SECUNIA-35746
SECUNIA-39428
OSVDB-54514
OSVDB-54515
ADV-2009-1313
ADV-2009-2012
APPLE-SA-2010-03-29-1
DSA-1807
GLSA-200907-09
MDVSA-2009:113
RHSA-2009:1116
SSA:2009-134-01
SUSE-SR:2009:011
TA10-103B
USN-790-1
VU#238019
ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz
http://support.apple.com/kb/HT4077
http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm
http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091
http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html
solaris-sasl-saslencode64-bo(50554)

CWE    1
CWE-119
OVAL    10
oval:org.secpod.oval:def:300856
oval:org.secpod.oval:def:202073
oval:org.secpod.oval:def:300463
oval:org.secpod.oval:def:500606
...

© 2013 SecPod Technologies