Scientific Linux Security Update : cyrus-sasl on SL4.x, SL3.x i386/x86_64

low Nessus Plugin ID 60245

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
As part of the DIGEST-MD5 authentication exchange, the client is expected to send a specific set of information to the server. If one of these items (the 'realm') was not sent or was malformed, it was possible for a remote unauthenticated attacker to cause a denial of service (segmentation fault) on the server. (CVE-2006-1721)

This errata also fixes the following bugs in Scientific Linux 4 :

- the Kerberos 5 library included in Red Hat Enterprise Linux 4 was not thread safe. This update adds functionality which allows it to be used safely in a threaded application.

- several memory leak bugs were fixed in cyrus-sasl's DIGEST-MD5 authentication plug-in.

- /dev/urandom is now used by default on systems which don't support hwrandom. Previously, dev/random was the default.

- cyrus-sasl needs zlib-devel to build properly. This dependency information is now included in the package.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?2788f60d

Plugin Details

Severity: Low

ID: 60245

File Name: sl_20070904_cyrus_sasl_on_SL4_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 9/4/2007

Reference Information

CVE: CVE-2006-1721