FreeBSD : cyrus-sasl -- buffer overflow vulnerability (14ab174c-40ef-11de-9fd5-001bd3385381)

high Nessus Plugin ID 38779

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

US-CERT reports :

The sasl_encode64() function converts a string into base64. The Cyrus SASL library contains buffer overflows that occur because of unsafe use of the sasl_encode64() function.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?ebe78c9b

Plugin Details

Severity: High

ID: 38779

File Name: freebsd_pkg_14ab174c40ef11de9fd5001bd3385381.nasl

Version: 1.16

Type: local

Published: 5/15/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cyrus-sasl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/15/2009

Vulnerability Publication Date: 4/8/2009

Reference Information

CVE: CVE-2009-0688

CWE: 119

CERT: 238019