First published: Thu Oct 07 2004(Updated: )
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =2.1.16 | |
Cyrus SASL | =2.1.13 | |
Conectiva Linux | =9.0 | |
Cyrus SASL | =2.1.18_r1 | |
Cyrus SASL | =2.1.11 | |
openpkg openpkg | =2.1 | |
Cyrus SASL | =1.5.24 | |
Cyrus SASL | =1.5.27 | |
Cyrus SASL | =2.1.14 | |
Cyrus SASL | =1.5.28 | |
Cyrus SASL | =2.1.18 | |
Cyrus SASL | =2.1.12 | |
Cyrus SASL | =2.1.17 | |
openpkg openpkg | =2.2 | |
SUSe SUSe CVSUp | =16.1h_36.i586 | |
Conectiva Linux | =10.0 | |
Cyrus SASL | =2.1.9 | |
Cyrus SASL | =2.1.10 | |
Cyrus SASL | =2.1.15 | |
SUSE Linux | =9.0 | |
Apple macOS Server | =10.3.2 | |
Apple macOS Server | =10.1.5 | |
Apple macOS Server | =10.1 | |
Apple iOS and macOS | =10.2.5 | |
Apple macOS Server | =10.2.2 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.0 | |
Apple iOS and macOS | =10.2.7 | |
Apple iOS and macOS | =10.0.2 | |
Apple macOS Server | =10.1.1 | |
Apple iOS and macOS | =10.2.8 | |
Apple macOS Server | =10.2.4 | |
Apple iOS and macOS | =10.2.1 | |
SUSE Linux | =8.2 | |
Apple macOS Server | =10.1.2 | |
Apple macOS Server | =10.3.7 | |
Apple macOS Server | =10.3.5 | |
Apple iOS and macOS | =10.3.1 | |
SUSE Linux | =1.0 | |
Apple iOS and macOS | =10.3.5 | |
Apple iOS and macOS | =10.1 | |
Apple macOS Server | =10.3.3 | |
SUSE Linux | =9.0 | |
Apple macOS Server | =10.2.7 | |
Apple iOS and macOS | =10.0.1 | |
Red Hat Fedora Core | =core_1.0 | |
Apple macOS Server | =10.2.3 | |
Apple iOS and macOS | =10.0.3 | |
Apple iOS and macOS | =10.1.4 | |
Apple iOS and macOS | =10.2.4 | |
SUSE Linux | =8.0 | |
Apple macOS Server | =10.3.4 | |
Apple iOS and macOS | =10.3.2 | |
Apple iOS and macOS | =10.2.2 | |
Apple iOS and macOS | =10.0 | |
Apple iOS and macOS | =10.3.7 | |
Apple macOS Server | =10.2.5 | |
Apple iOS and macOS | =10.1.3 | |
SUSE Linux | =8.0 | |
SUSE Linux | =9.1 | |
Apple iOS and macOS | =10.3.6 | |
Apple macOS Server | =10.3 | |
Apple macOS Server | =10.3.8 | |
Apple iOS and macOS | =10.1.5 | |
Apple macOS Server | =10.2.6 | |
Apple macOS Server | =10.2 | |
Apple iOS and macOS | =10.3.8 | |
Apple macOS Server | =10.2.1 | |
Apple iOS and macOS | =10.1.1 | |
Apple macOS Server | =10.3.1 | |
Apple macOS Server | =10.1.4 | |
Apple iOS and macOS | =10.3.4 | |
Apple iOS and macOS | =10.3.3 | |
Apple iOS and macOS | =10.2.6 | |
Apple iOS and macOS | =10.2.3 | |
SUSE Linux | =9.2 | |
Apple macOS Server | =10.0 | |
Apple macOS Server | =10.2.8 | |
Apple iOS and macOS | =10.2 | |
SUSE Linux | =8.1 | |
Apple iOS and macOS | =10.3 | |
Apple macOS Server | =10.3.6 | |
Apple iOS and macOS | =10.0.4 | |
Apple macOS Server | =10.1.3 | |
Apple iOS and macOS | =10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0373 has a critical severity level due to its potential for remote code execution.
To fix CVE-2005-0373, upgrade to a version of Cyrus SASL that does not include the vulnerable digestmd5.c.
CVE-2005-0373 affects multiple versions of Cyrus SASL, including versions 1.5.24 and 2.1.16.
Yes, CVE-2005-0373 can be exploited by remote attackers to execute arbitrary code.
The main risks of CVE-2005-0373 include unauthorized remote access and execution of malicious code on vulnerable systems.