GLSA-200410-05 : Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities
High Nessus Plugin ID 15431
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200410-05 (Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities)
Cyrus-SASL contains a remote buffer overflow in the digestmda5.c file.
Additionally, under certain conditions it is possible for a local user to exploit a vulnerability in the way the SASL_PATH environment variable is honored (CAN-2004-0884).
An attacker might be able to execute arbitrary code with the Effective ID of the application calling the Cyrus-SASL libraries.
There is no known workaround at this time.
SolutionAll Cyrus-SASL users should upgrade to the latest stable version:
# emerge sync # emerge -pv '>=dev-libs/cyrus-sasl-2.1.18-r2' # emerge '>=dev-libs/cyrus-sasl-2.1.18-r2'