Skip to navigation

Security Advisory Updated cyrus-sasl packages fix buffer overflows

Advisory: RHSA-2002:283-09
Type: Security Advisory
Severity: N/A
Issued on: 2003-01-07
Last updated on: 2003-01-06
Affected Products: Red Hat Linux 8.0
CVEs (cve.mitre.org): CVE-2002-1347

Details

Updated cyrus-sasl packages are now available for Red Hat Linux 8.0. These
packages close buffer overflows present in Cyrus SASL 2.1 and later.

Cyrus SASL is an implementation of the Simple Authentication and Security
Layer, a method for adding authentication support to connection-based
protocols. Cyrus SASL versions 2 prior to 2.1.10 include a number of
buffer overflow vulnerabilities:

Insufficient buffer length checking in user name canonicalization. This
issue would be hard to exploit, but would allow a remote user to execute
arbitrary code on the system.

When performing authentication using LDAP, saslauthd does not allocate
enough memory when it needs to escape special characters in the username
and realm. This issue may be easy to remotely exploit.

The Log writer might not have allocated memory for the trailing \0 in a
message. This issue is probably hard to exploit, although it is possible to
affect the logging data with at least anonymous authentication.

All users of Cyrus-SASL on Red Hat Linux 8.0 are advised to upgrade to the
erratum packages containing Cyrus SASL version 2.1.10 which is not affected
by these vulnerabilities. Other Red Hat Linux releases are not affected by
this vulnerability as they included Cyrus-SASL version 1.5.x.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Linux 8.0

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/cyrus-sasl/2.1.10-1/SRPMS/cyrus-sasl-2.1.10-1.src.rpm
Missing file
    MD5: e291b7bd71cd69825077aba5a3341764
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/cyrus-sasl/2.1.10-1/i386/cyrus-sasl-2.1.10-1.i386.rpm
Missing file
    MD5: 0bf0d5b2e17a26e06f1b9e2cd02fdae3
ftp://updates.redhat.com/rhn/repository/NULL/cyrus-sasl-devel/2.1.10-1/i386/cyrus-sasl-devel-2.1.10-1.i386.rpm
Missing file
    MD5: 80d77339fc5a06bed5073cd34019d9f4
ftp://updates.redhat.com/rhn/repository/NULL/cyrus-sasl-gssapi/2.1.10-1/i386/cyrus-sasl-gssapi-2.1.10-1.i386.rpm
Missing file
    MD5: 877a229ffe46aa7be012f8d69fa1d544
ftp://updates.redhat.com/rhn/repository/NULL/cyrus-sasl-md5/2.1.10-1/i386/cyrus-sasl-md5-2.1.10-1.i386.rpm
Missing file
    MD5: 8568b99569bceb11d237fd302d372113
ftp://updates.redhat.com/rhn/repository/NULL/cyrus-sasl-plain/2.1.10-1/i386/cyrus-sasl-plain-2.1.10-1.i386.rpm
Missing file
    MD5: bc69bfc361c0c75c15be0d7557133633
 

References


Keywords

buffer, cyrus-sasl, flaw:buf, overflow


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/