First published: Thu Oct 21 2004(Updated: )
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =2.1.16 | |
Cyrus SASL | =2.1.13 | |
Conectiva Linux | =9.0 | |
Cyrus SASL | =2.1.18_r1 | |
Cyrus SASL | =2.1.11 | |
Cyrus SASL | =1.5.24 | |
Cyrus SASL | =1.5.27 | |
Cyrus SASL | =2.1.14 | |
Cyrus SASL | =1.5.28 | |
Cyrus SASL | =2.1.18 | |
Cyrus SASL | =2.1.12 | |
Cyrus SASL | =2.1.17 | |
Conectiva Linux | =10.0 | |
Cyrus SASL | =2.1.9 | |
Cyrus SASL | =2.1.10 | |
Cyrus SASL | =2.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.