(Sun Issues Fix) Cyrus SASL Buffer Overflow in sasl_encode64 Lets Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1022239 |
SecurityTracker URL: http://securitytracker.com/id/1022239
|
CVE Reference:
CVE-2009-0688
(Links to External Site)
|
Updated: Jul 28 2009
|
Original Entry Date: May 18 2009
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2.1.22 and prior versions
|
Description:
A vulnerability was reported in Cyrus SASL. A remote user can execute arbitrary code on the target system.
A remote user can send specially crafted data to trigger a buffer overflow in the sasl_encode64() function and execute arbitrary code on the target system. The code will run with the privileges of the target service.
The original advisory is available at:
http://www.kb.cert.org/vuls/id/238019
US-CERT reported this vulnerability.
|
Impact:
A remote user can execute arbitrary code on the target system.
|
Solution:
Sun has issued a fix for OpenSolaris.
SPARC Platform
* OpenSolaris based upon builds snv_118 or later
x86 Platform
* OpenSolaris based upon builds snv_118 or later
Sun is working on a fix for Solaris 10.
The Sun advisory is available at:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259148-1
|
Vendor URL: asg.web.cmu.edu/sasl/ (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: UNIX (Solaris - SunOS)
|
Underlying OS Comments: 10, OpenSolaris
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|