Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50416
Category:Fedora Local Security Checks
Title:Fedora Core 2 FEDORA-2004-332 (cyrus-sasl)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to cyrus-sasl
announced via advisory FEDORA-2004-332.

The cyrus-sasl package contains the Cyrus implementation of SASL.
SASL is the Simple Authentication and Security Layer, a method for
adding authentication support to connection-based protocols.

Update Information:

At application startup, libsasl and libsasl2 attempt to build a list
of all SASL plug-ins which are available on the system. To do so,
the libraries search for and attempt to load every shared library
found within the plug-in directory. This location can be set with
the SASL_PATH environment variable.

In situations where an untrusted local user can affect the
environment of a privileged process, this behavior could be exploited
to run arbitrary code with the privileges of a setuid or setgid
application. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0884 to this issue.

Users of cyrus-sasl should upgrade to these updated packages, which
contain backported patches and are not vulnerable to this issue.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/

74c6c5f219ade64c4514ec64dab48376 SRPMS/cyrus-sasl-2.1.18-2.2.src.rpm
f3095f3563e54d3f6a8481560542ff64 x86_64/cyrus-sasl-2.1.18-2.2.x86_64.rpm
ab802d3faa874f078051109578b698e9 x86_64/cyrus-sasl-devel-2.1.18-2.2.x86_64.rpm
e9569f4c67f59de333fa6beca6260e7d x86_64/cyrus-sasl-gssapi-2.1.18-2.2.x86_64.rpm
5ab29e7ad1bbca0d098984ec73e8b6a8 x86_64/cyrus-sasl-plain-2.1.18-2.2.x86_64.rpm
b9b362e882c9950a5da33f15bb5207f0 x86_64/cyrus-sasl-md5-2.1.18-2.2.x86_64.rpm
270d6d4738a4a674ff79256cf42ea0a4 x86_64/debug/cyrus-sasl-debuginfo-2.1.18-2.2.x86_64.rpm
c8b8e3c700ef3e48b53eab20e6ee7f62 i386/cyrus-sasl-2.1.18-2.2.i386.rpm
1ae4633b8efae2f9c7b963398cee58c5 i386/cyrus-sasl-devel-2.1.18-2.2.i386.rpm
1e9062a935b0ae9482dd190ead4b099c i386/cyrus-sasl-gssapi-2.1.18-2.2.i386.rpm
40e096e298d95ce2a6d24b7cf4cf8ef1 i386/cyrus-sasl-plain-2.1.18-2.2.i386.rpm
fbea0811ec245e404637c651b10f1e64 i386/cyrus-sasl-md5-2.1.18-2.2.i386.rpm
9370a1bbf9ca58297a1d721f929113e4 i386/debug/cyrus-sasl-debuginfo-2.1.18-2.2.i386.rpm

This update can also be installed with the Update Agent
you can
launch the Update Agent with the 'up2date' command.

Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-332.shtml

Risk factor : High

CVSS Score:
7.2

Cross-Ref: BugTraq ID: 11347
Common Vulnerability Exposure (CVE) ID: CVE-2004-0884
http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
http://www.securityfocus.com/bid/11347
Bugtraq: 20050128 [OpenPKG-SA-2005.004] OpenPKG Security Advisory (sasl) (Google Search)
http://marc.info/?l=bugtraq&m=110693126007214&w=2
Computer Incident Advisory Center Bulletin: P-003
http://www.ciac.org/ciac/bulletins/p-003.shtml
Debian Security Information: DSA-563 (Google Search)
http://www.debian.org/security/2004/dsa-563
Debian Security Information: DSA-568 (Google Search)
http://www.debian.org/security/2004/dsa-568
https://bugzilla.fedora.us/show_bug.cgi?id=2137
http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2004:106
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11678
RedHat Security Advisories: RHSA-2004:546
http://rhn.redhat.com/errata/RHSA-2004-546.html
http://www.trustix.net/errata/2004/0053/
XForce ISS Database: cyrus-sasl-saslpath(17643)
https://exchange.xforce.ibmcloud.com/vulnerabilities/17643
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.