First published: Tue Apr 11 2006(Updated: )
digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions before 2.1.21, allows remote unauthenticated attackers to cause a denial of service (segmentation fault) via malformed inputs in DIGEST-MD5 negotiation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =2.1.18_r1 | |
Cyrus SASL | =2.1.19 | |
Cyrus SASL | =2.1.18 | |
Cyrus SASL | =2.1.18_r2 | |
Cyrus SASL | =2.1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1721 has been classified as a potential denial of service vulnerability.
To fix CVE-2006-1721, update the CMU Cyrus SASL library to version 2.1.21 or later.
CVE-2006-1721 affects CMU Cyrus SASL versions 2.1.18, 2.1.19, 2.1.20, and earlier versions before 2.1.21.
Yes, CVE-2006-1721 can be exploited by remote unauthenticated attackers.
The impact of CVE-2006-1721 is a segmentation fault that leads to a denial of service condition.