First published: Sun Oct 27 2013(Updated: )
Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cmu Cyrus-sasl | <=2.1.26 | |
Cmu Cyrus-sasl | =1.5.28 | |
Cmu Cyrus-sasl | =2.1.19 | |
Cmu Cyrus-sasl | =2.1.20 | |
Cmu Cyrus-sasl | =2.1.21 | |
Cmu Cyrus-sasl | =2.1.22 | |
Cmu Cyrus-sasl | =2.1.23 | |
Cmu Cyrus-sasl | =2.1.24 | |
Cmu Cyrus-sasl | =2.1.25 | |
GNU glibc | =2.2 | |
GNU glibc | =2.2.1 | |
GNU glibc | =2.2.2 | |
GNU glibc | =2.2.3 | |
GNU glibc | =2.2.4 | |
GNU glibc | =2.2.5 | |
GNU glibc | =2.3 | |
GNU glibc | =2.3.1 | |
GNU glibc | =2.3.2 | |
GNU glibc | =2.3.3 | |
GNU glibc | =2.3.4 | |
GNU glibc | =2.3.5 | |
GNU glibc | =2.3.6 | |
GNU glibc | =2.3.10 | |
GNU glibc | =2.4 | |
GNU glibc | =2.5 | |
GNU glibc | =2.5.1 | |
GNU glibc | =2.6 | |
GNU glibc | =2.6.1 | |
GNU glibc | =2.7 | |
GNU glibc | =2.8 | |
GNU glibc | =2.9 | |
GNU glibc | =2.17 | |
GNU glibc | =2.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.