First published: Tue Jan 28 2020(Updated: )
It was discovered that Cyrus SASL incorrectly handled certain LDAP packets. An attacker could possibly use this issue to execute arbitrary code or cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libsasl2-2 | <2.1.27+dfsg-1ubuntu0.1 | 2.1.27+dfsg-1ubuntu0.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/libsasl2-2 | <2.1.27~101-g0780600+dfsg-3ubuntu2.1 | 2.1.27~101-g0780600+dfsg-3ubuntu2.1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libsasl2-2 | <2.1.26.dfsg1-14ubuntu0.2 | 2.1.26.dfsg1-14ubuntu0.2 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/libsasl2-2 | <2.1.25.dfsg1-17ubuntu0.1~esm1 | 2.1.25.dfsg1-17ubuntu0.1~esm1 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/libsasl2-2 | <2.1.25.dfsg1-3ubuntu0.2 | 2.1.25.dfsg1-3ubuntu0.2 |
Ubuntu Linux | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability USN-4256-1 has a high severity as it allows for potential arbitrary code execution or denial of service.
To fix USN-4256-1, upgrade the libsasl2-2 package to the recommended versions listed in the advisory.
USN-4256-1 affects Ubuntu 19.10, 18.04, 16.04, 14.04, and 12.04.
The USN-4256-1 vulnerability specifically affects the Cyrus SASL implementation found in the libsasl2-2 package.
Yes, an attacker could exploit the USN-4256-1 vulnerability remotely through crafted LDAP packets.