![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50416 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 2 FEDORA-2004-332 (cyrus-sasl) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to cyrus-sasl announced via advisory FEDORA-2004-332. The cyrus-sasl package contains the Cyrus implementation of SASL. SASL is the Simple Authentication and Security Layer, a method for adding authentication support to connection-based protocols. Update Information: At application startup, libsasl and libsasl2 attempt to build a list of all SASL plug-ins which are available on the system. To do so, the libraries search for and attempt to load every shared library found within the plug-in directory. This location can be set with the SASL_PATH environment variable. In situations where an untrusted local user can affect the environment of a privileged process, this behavior could be exploited to run arbitrary code with the privileges of a setuid or setgid application. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0884 to this issue. Users of cyrus-sasl should upgrade to these updated packages, which contain backported patches and are not vulnerable to this issue. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ 74c6c5f219ade64c4514ec64dab48376 SRPMS/cyrus-sasl-2.1.18-2.2.src.rpm f3095f3563e54d3f6a8481560542ff64 x86_64/cyrus-sasl-2.1.18-2.2.x86_64.rpm ab802d3faa874f078051109578b698e9 x86_64/cyrus-sasl-devel-2.1.18-2.2.x86_64.rpm e9569f4c67f59de333fa6beca6260e7d x86_64/cyrus-sasl-gssapi-2.1.18-2.2.x86_64.rpm 5ab29e7ad1bbca0d098984ec73e8b6a8 x86_64/cyrus-sasl-plain-2.1.18-2.2.x86_64.rpm b9b362e882c9950a5da33f15bb5207f0 x86_64/cyrus-sasl-md5-2.1.18-2.2.x86_64.rpm 270d6d4738a4a674ff79256cf42ea0a4 x86_64/debug/cyrus-sasl-debuginfo-2.1.18-2.2.x86_64.rpm c8b8e3c700ef3e48b53eab20e6ee7f62 i386/cyrus-sasl-2.1.18-2.2.i386.rpm 1ae4633b8efae2f9c7b963398cee58c5 i386/cyrus-sasl-devel-2.1.18-2.2.i386.rpm 1e9062a935b0ae9482dd190ead4b099c i386/cyrus-sasl-gssapi-2.1.18-2.2.i386.rpm 40e096e298d95ce2a6d24b7cf4cf8ef1 i386/cyrus-sasl-plain-2.1.18-2.2.i386.rpm fbea0811ec245e404637c651b10f1e64 i386/cyrus-sasl-md5-2.1.18-2.2.i386.rpm 9370a1bbf9ca58297a1d721f929113e4 i386/debug/cyrus-sasl-debuginfo-2.1.18-2.2.i386.rpm This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-332.shtml Risk factor : High CVSS Score: 7.2 |
Cross-Ref: |
BugTraq ID: 11347 Common Vulnerability Exposure (CVE) ID: CVE-2004-0884 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html http://www.securityfocus.com/bid/11347 Bugtraq: 20050128 [OpenPKG-SA-2005.004] OpenPKG Security Advisory (sasl) (Google Search) http://marc.info/?l=bugtraq&m=110693126007214&w=2 Computer Incident Advisory Center Bulletin: P-003 http://www.ciac.org/ciac/bulletins/p-003.shtml Debian Security Information: DSA-563 (Google Search) http://www.debian.org/security/2004/dsa-563 Debian Security Information: DSA-568 (Google Search) http://www.debian.org/security/2004/dsa-568 https://bugzilla.fedora.us/show_bug.cgi?id=2137 http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:106 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11678 RedHat Security Advisories: RHSA-2004:546 http://rhn.redhat.com/errata/RHSA-2004-546.html http://www.trustix.net/errata/2004/0053/ XForce ISS Database: cyrus-sasl-saslpath(17643) https://exchange.xforce.ibmcloud.com/vulnerabilities/17643 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |