First published: Tue Dec 31 2002(Updated: )
SQL injection vulnerability in the LDAP and MySQL authentication patch for Cyrus SASL 1.5.24 and 1.5.27 allows remote attackers to execute arbitrary SQL commands and log in as arbitrary POP mail users via the password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =1.5.24 | |
Cyrus SASL | =1.5.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2043 is considered a medium to high severity vulnerability due to potential unauthorized access to user accounts.
To fix CVE-2002-2043, upgrade to a later version of Cyrus SASL that is not affected, specifically beyond 1.5.27.
CVE-2002-2043 affects systems running Cyrus SASL versions 1.5.24 and 1.5.27 with LDAP and MySQL authentication.
Yes, CVE-2002-2043 can be exploited remotely by attackers to execute arbitrary SQL commands.
Exploitation of CVE-2002-2043 could allow attackers to gain unauthorized access to POP mail user accounts.