Scientific Linux Security Update : cyrus-sasl on SL4.x, SL3.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism.
As part of the DIGEST-MD5 authentication exchange, the client is
expected to send a specific set of information to the server. If one
of these items (the 'realm') was not sent or was malformed, it was
possible for a remote unauthenticated attacker to cause a denial of
service (segmentation fault) on the server. (CVE-2006-1721)

This errata also fixes the following bugs in Scientific Linux 4 :

- the Kerberos 5 library included in Red Hat Enterprise
Linux 4 was not thread safe. This update adds
functionality which allows it to be used safely in a
threaded application.

- several memory leak bugs were fixed in cyrus-sasl's
DIGEST-MD5 authentication plug-in.

- /dev/urandom is now used by default on systems which
don't support hwrandom. Previously, dev/random was the

- cyrus-sasl needs zlib-devel to build properly. This
dependency information is now included in the package.

See also :

Solution :

Update the affected packages.

Risk factor :

Low / CVSS Base Score : 2.6

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60245 ()

Bugtraq ID:

CVE ID: CVE-2006-1721

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now