Package: cyrus-sasl2
Severity: serious
Tags: security

Hi,

The following vulnerability has been published for Cyrus SASL:

Cyrus SASL library buffer overflow vulnerability

Overview

The Cyrus SASL library contains a buffer overflow vulnerability that could
allow an attacker to execute code or cause a vulnerable program to crash.

I. Description
SASL (Simple Authentication and Security Layer) is a method for adding
authentication support to various protocols. SASL is commonly used by mail
servers to request authentication from clients and by clients to
authenticate to servers.

The sasl_encode64() function converts a string into base64. The Cyrus SASL
library contains buffer overflows that occur because of unsafe use of the
sasl_encode64() function.

II. Impact
A remote attacker might be able to execute code, or cause any programs
relying on SASL to crash or be unavailable.

III. Solution: Upgrade
Cyrus SASL 2.1.23 has been released to address this issue. Before
releasing fixed binaries, maintainers are encouraged to review the Cyrus
vendor statement associated with this note.

See also: http://www.kb.cert.org/vuls/id/RGII-7RYLZQ

This is CVE-2009-0688 and VU#238019.
Please mention these references in your changelogs.

Can you provide updated packages for sid, and assess whether etch/lenny
are affected?


thanks,
Thijs




--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to