FreeBSD : cyrus-sasl -- buffer overflow vulnerability (14ab174c-40ef-11de-9fd5-001bd3385381)

High Nessus Plugin ID 38779


The remote FreeBSD host is missing a security-related update.


US-CERT reports :

The sasl_encode64() function converts a string into base64. The Cyrus SASL library contains buffer overflows that occur because of unsafe use of the sasl_encode64() function.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 38779

File Name: freebsd_pkg_14ab174c40ef11de9fd5001bd3385381.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2009/05/15

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cyrus-sasl, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2009/05/15

Vulnerability Publication Date: 2009/04/08

Reference Information

CVE: CVE-2009-0688

CERT: 238019

CWE: 119