First published: Thu Oct 07 2004(Updated: )
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =2.1.16 | |
Cyrus SASL | =2.1.13 | |
Conectiva Linux | =9.0 | |
Cyrus SASL | =2.1.18_r1 | |
Cyrus SASL | =2.1.11 | |
Openpkg Openpkg | =2.1 | |
Cyrus SASL | =1.5.24 | |
Cyrus SASL | =1.5.27 | |
Cyrus SASL | =2.1.14 | |
Cyrus SASL | =1.5.28 | |
Cyrus SASL | =2.1.18 | |
Cyrus SASL | =2.1.12 | |
Cyrus SASL | =2.1.17 | |
Openpkg Openpkg | =2.2 | |
Suse Suse Cvsup | =16.1h_36.i586 | |
Conectiva Linux | =10.0 | |
Cyrus SASL | =2.1.9 | |
Cyrus SASL | =2.1.10 | |
Cyrus SASL | =2.1.15 | |
Suse Suse Linux | =9.0 | |
Apple Mac OS X Server | =10.3.2 | |
Apple Mac OS X Server | =10.1.5 | |
Apple Mac OS X Server | =10.1 | |
Apple Mac OS X | =10.2.5 | |
Apple Mac OS X Server | =10.2.2 | |
Suse Suse Linux | =9.2 | |
Suse Suse Linux | =9.1 | |
Suse Suse Linux | =9.0 | |
Apple Mac OS X | =10.2.7 | |
Apple Mac OS X | =10.0.2 | |
Apple Mac OS X Server | =10.1.1 | |
Apple Mac OS X | =10.2.8 | |
Apple Mac OS X Server | =10.2.4 | |
Apple Mac OS X | =10.2.1 | |
Suse Suse Linux | =8.2 | |
Apple Mac OS X Server | =10.1.2 | |
Apple Mac OS X Server | =10.3.7 | |
Apple Mac OS X Server | =10.3.5 | |
Apple Mac OS X | =10.3.1 | |
Suse Suse Linux | =1.0 | |
Apple Mac OS X | =10.3.5 | |
Apple Mac OS X | =10.1 | |
Apple Mac OS X Server | =10.3.3 | |
Suse Suse Linux | =9.0 | |
Apple Mac OS X Server | =10.2.7 | |
Apple Mac OS X | =10.0.1 | |
Redhat Fedora Core | =core_1.0 | |
Apple Mac OS X Server | =10.2.3 | |
Apple Mac OS X | =10.0.3 | |
Apple Mac OS X | =10.1.4 | |
Apple Mac OS X | =10.2.4 | |
Suse Suse Linux | =8.0 | |
Apple Mac OS X Server | =10.3.4 | |
Apple Mac OS X | =10.3.2 | |
Apple Mac OS X | =10.2.2 | |
Apple Mac OS X | =10.0 | |
Apple Mac OS X | =10.3.7 | |
Apple Mac OS X Server | =10.2.5 | |
Apple Mac OS X | =10.1.3 | |
Suse Suse Linux | =8.0 | |
Suse Suse Linux | =9.1 | |
Apple Mac OS X | =10.3.6 | |
Apple Mac OS X Server | =10.3 | |
Apple Mac OS X Server | =10.3.8 | |
Apple Mac OS X | =10.1.5 | |
Apple Mac OS X Server | =10.2.6 | |
Apple Mac OS X Server | =10.2 | |
Apple Mac OS X | =10.3.8 | |
Apple Mac OS X Server | =10.2.1 | |
Apple Mac OS X | =10.1.1 | |
Apple Mac OS X Server | =10.3.1 | |
Apple Mac OS X Server | =10.1.4 | |
Apple Mac OS X | =10.3.4 | |
Apple Mac OS X | =10.3.3 | |
Apple Mac OS X | =10.2.6 | |
Apple Mac OS X | =10.2.3 | |
Suse Suse Linux | =9.2 | |
Apple Mac OS X Server | =10.0 | |
Apple Mac OS X Server | =10.2.8 | |
Apple Mac OS X | =10.2 | |
Suse Suse Linux | =8.1 | |
Apple Mac OS X | =10.3 | |
Apple Mac OS X Server | =10.3.6 | |
Apple Mac OS X | =10.0.4 | |
Apple Mac OS X Server | =10.1.3 | |
Apple Mac OS X | =10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.