Description
Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1807-1 | New cyrus-sasl2/cyrus-sasl2-heimdal packages fix arbitrary code execution |
Ubuntu USN |
USN-790-1 | Cyrus SASL vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-07T04:40:05.371Z
Reserved: 2009-02-22T00:00:00.000Z
Link: CVE-2009-0688
No data.
Status : Modified
Published: 2009-05-15T15:30:00.187
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0688
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN