Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58559
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2007:0795
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2007:0795.

The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is
the Simple Authentication and Security Layer, a method for adding
authentication support to connection-based protocols.

A bug was found in cyrus-sasl's DIGEST-MD5 authentication mechanism. As
part of the DIGEST-MD5 authentication exchange, the client is expected to
send a specific set of information to the server. If one of these items
(the realm) was not sent or was malformed, it was possible for a remote
unauthenticated attacker to cause a denial of service (segmentation fault)
on the server. (CVE-2006-1721)

This errata also fixes the following bugs:

* the Kerberos 5 library included in Red Hat Enterprise Linux 4 was not
thread safe. This update adds functionality which allows it to be used
safely in a threaded application.

* several memory leak bugs were fixed in cyrus-sasl's DIGEST-MD5
authentication plug-in.

* /dev/urandom is now used by default on systems which don't support
hwrandom. Previously, dev/random was the default.

* cyrus-sasl needs zlib-devel to build properly. This dependency
information is now included in the package.

Users are advised to upgrade to this updated cyrus-sasl package, which
resolves these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-0795.html
http://www.redhat.com/security/updates/classification/#moderate

Risk factor : Medium

CVSS Score:
2.6

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-1721
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
BugTraq ID: 17446
http://www.securityfocus.com/bid/17446
Bugtraq: 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (Google Search)
http://www.securityfocus.com/archive/1/493080/100/0/threaded
Debian Security Information: DSA-1042 (Google Search)
http://www.debian.org/security/2006/dsa-1042
http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044992.html
http://www.gentoo.org/security/en/glsa/glsa-200604-09.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:073
http://labs.musecurity.com/advisories/MU-200604-01.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9861
http://www.redhat.com/support/errata/RHSA-2007-0795.html
http://www.redhat.com/support/errata/RHSA-2007-0878.html
http://securitytracker.com/id?1016960
http://secunia.com/advisories/19618
http://secunia.com/advisories/19753
http://secunia.com/advisories/19809
http://secunia.com/advisories/19825
http://secunia.com/advisories/19964
http://secunia.com/advisories/20014
http://secunia.com/advisories/22187
http://secunia.com/advisories/26708
http://secunia.com/advisories/26857
http://secunia.com/advisories/27237
http://secunia.com/advisories/30535
SGI Security Advisory: 20070901-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
SuSE Security Announcement: SUSE-SA:2006:025 (Google Search)
http://www.novell.com/linux/security/advisories/2006_05_05.html
http://www.trustix.org/errata/2006/0024
https://usn.ubuntu.com/272-1/
http://www.vupen.com/english/advisories/2006/1306
http://www.vupen.com/english/advisories/2006/3852
http://www.vupen.com/english/advisories/2008/1744
XForce ISS Database: cyrus-sasl-digest-dos(25738)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25738
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.