Debian Cyrus-Sasl2 vulnerabilities

9 known vulnerabilities affecting debian/cyrus-sasl2.

Total CVEs
9
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH5MEDIUM1LOW2

Vulnerabilities

Page 1 of 1
CVE-2022-24407HIGHCVSS 8.8fixed in cyrus-sasl2 2.1.28+dfsg-2 (bookworm)2022
CVE-2022-24407 [HIGH] CVE-2022-24407: cyrus-sasl2 - In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape... In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement. Scope: local bookworm: resolved (fixed in 2.1.28+dfsg-2) bullseye: resolved (fixed in 2.1.27+dfsg-2.1+deb11u1) forky: resolved (fixed in 2.1.28+dfsg-2) sid: resolved (fixed in 2.1.28+dfsg-2) trixie: resolved (fixed in 2.1.28+dfsg-2)
debian
CVE-2020-8032LOWCVSS 6.72020
CVE-2020-8032 [MEDIUM] CVE-2020-8032: cyrus-sasl2 - A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSU... A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2019-19906HIGHCVSS 7.5fixed in cyrus-sasl2 2.1.27+dfsg-2 (bookworm)2019
CVE-2019-19906 [HIGH] CVE-2019-19906: cyrus-sasl2 - cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthe... cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl. Scope: local bookworm: resolved (fixed in 2.1.27+dfsg-2) bullseye: resolved (fixed in 2.1.27+dfsg-2
debian
CVE-2013-4122MEDIUMCVSS 4.3fixed in cyrus-sasl2 2.1.26.dfsg1-14 (bookworm)2013
CVE-2013-4122 [MEDIUM] CVE-2013-4122: cyrus-sasl2 - Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL valu... Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which tri
debian
CVE-2009-0688HIGHCVSS 7.5fixed in cyrus-sasl2 2.1.23.dfsg1-1 (bookworm)2009
CVE-2009-0688 [HIGH] CVE-2009-0688: cyrus-sasl2 - Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allo... Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c. Scope: local bookworm: resolved (fixed in 2.1.23.dfsg1-1) bullseye: resolved (fixed in 2.1.23.dfsg1-1) forky
debian
CVE-2006-1721LOWCVSS 2.6fixed in cyrus-sasl2 2.1.19.dfsg1-0.2 (bookworm)2006
CVE-2006-1721 [LOW] CVE-2006-1721: cyrus-sasl2 - digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) lib... digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation. Scope: local bookworm: resolved (fixed in 2.1.19.dfsg1-0.2) bullseye: resolved (fixed in 2.1.
debian
CVE-2005-0373HIGHCVSS 7.5fixed in cyrus-sasl2 2.1.19.dfsg1-0sarge2 (bookworm)2005
CVE-2005-0373 [HIGH] CVE-2005-0373: cyrus-sasl2 - Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5... Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code. Scope: local bookworm: resolved (fixed in 2.1.19.dfsg1-0sarge2) bullseye: resolved (fixed in 2.1.19.dfsg1-0sarge2) forky: resolved (fixed in 2.
debian
CVE-2004-0884HIGHCVSS 7.2fixed in cyrus-sasl2 2.1.19-1.3 (bookworm)2004
CVE-2004-0884 [HIGH] CVE-2004-0884: cyrus-sasl2 - The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trus... The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs. Scope: local bookworm: resolved (fixed in 2.1.19-1.3) bullseye: resolved (fixed in 2.1.19-1.3) forky:
debian
CVE-2002-1347CRITICALCVSS 9.8fixed in cyrus-sasl2 2.1.10-1 (bookworm)2002
CVE-2002-1347 [CRITICAL] CVE-2002-1347: cyrus-sasl2 - Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote a... Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate
debian