Vulnerabilities > Cyrus > Sasl

DATE CVE VULNERABILITY TITLE RISK
2006-04-11 CVE-2006-1721 Improper Input Validation vulnerability in Cyrus Sasl
digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
network
high complexity
cyrus CWE-20
2.6
2005-01-27 CVE-2004-0884 Remote And Local vulnerability in Cyrus SASL
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
local
low complexity
cyrus conectiva
7.2
2004-10-07 CVE-2005-0373 Remote And Local vulnerability in Cyrus SASL
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
network
low complexity
cyrus openpkg suse conectiva apple redhat
7.5
2002-12-31 CVE-2002-2043 Authentication Patch SQL Command Execution vulnerability in Cyrus SASL LDAP+MySQL
SQL injection vulnerability in the LDAP and MySQL authentication patch for Cyrus SASL 1.5.24 and 1.5.27 allows remote attackers to execute arbitrary SQL commands and log in as arbitrary POP mail users via the password.
network
low complexity
cyrus
7.5