Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA563] DSA-563-3 cyrus-sasl


Vulnerability Assessment Details

[DSA563] DSA-563-3 cyrus-sasl

Vulnerability Assessment Summary
DSA-563-3 cyrus-sasl

Detailed Explanation for this Vulnerability Assessment

This advisory is an addition to DSA 563-1 and 563-2 which weren't able
to supersede the library on sparc and arm due to a different version
number for them in the stable archive. Other architectures were
updated properly. Another problem was reported in connection with
sendmail, though, which should be fixed with this update as well.
For the stable distribution (woody) this problem has been fixed in
version 1.5.27-3.1woody5.
For reference the advisory text follows:
A vulnerability has been discovered in the Cyrus implementation of the
SASL library, the Simple Authentication and Security Layer, a method
for adding authentication support to connection-based protocols. The
library honors the environment variable SASL_PATH blindly, which
permits a local user to link against a malicious library to run
arbitrary code with the rights of a setuid or setgid application.
For the unstable distribution (sid) this problem has been fixed in
version 1.5.28-6.2 of cyrus-sasl and in version 2.1.19-1.3 of
cyrus-sasl2.
We recommend that you upgrade your libsasl packages.


Solution : http://www.debian.org/security/2004/dsa-563
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

HP BL460c Blade Server 64-bit 2×Xeon Quad-Core 3.0GHz + 32GB RAM + 2×300GB SAS
$195.0
HP BL460c Blade Server 64-bit 2×Xeon Quad-Core 3.0GHz + 32GB RAM + 2×300GB SAS pictureDell M1000E Blade Server w/ 5x M600 Blades 6x PSU 2x FM634 2x 10G-PTM Modules
$649.99
Dell M1000E Blade Server w/ 5x M600 Blades 6x PSU 2x FM634 2x 10G-PTM Modules pictureSUN Blade 1500 RED ,1.062Ghz,2GB RAM/,120GB HDD DVD XVR600-Solaris 10
$700.0
SUN Blade 1500 RED ,1.062Ghz,2GB RAM/,120GB HDD DVD  XVR600-Solaris 10  pictureHP HC10 BladeCenter 2.66Ghz 4GB No Hard Drive Blade Server 7996-5SU 43W6356
$22.98
HP HC10 BladeCenter 2.66Ghz 4GB No Hard Drive Blade Server 7996-5SU 43W6356 picture


Discussions

No Discussions have been posted on this vulnerability.