Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 2 2004-332: cyrus-sasl


Vulnerability Assessment Details

Fedora Core 2 2004-332: cyrus-sasl

Vulnerability Assessment Summary
Check for the version of the cyrus-sasl package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-332 (cyrus-sasl).

The cyrus-sasl package contains the Cyrus implementation of SASL.
SASL is the Simple Authentication and Security Layer, a method for
adding authentication support to connection-based protocols.

Update Information:

At application startup, libsasl and libsasl2 attempt to build a list
of all SASL plug-ins which are available on the system. To do so,
the libraries search for and attempt to load every shared library
found within the plug-in directory. This location can be set with
the SASL_PATH environment variable.

In situations where an untrusted local user can affect the
environment of a privileged process, this behavior could be exploited
to run arbitrary code with the rights of a setuid or setgid
application. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0884 to this issue.

Users of cyrus-sasl should upgrade to these updated packages, which
contain backported patches and are not vulnerable to this issue.



Solution : http://www.fedoranews.org/updates/FEDORA-2004-332.shtml
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

IBM 90Y9072 IBM.Processor Xeon E5 Intel Xeon Processor E5-4650 (20M Cache, 2.70
$726.0
IBM 90Y9072 IBM.Processor Xeon E5 Intel Xeon Processor E5-4650 (20M Cache, 2.70 pictureIntel SR0KM Intel.Processor Xeon E5 Six-Core 2.00 GHz Bus Speed: 7.20 GT/s LGA20
$196.0
Intel SR0KM Intel.Processor Xeon E5 Six-Core 2.00 GHz Bus Speed: 7.20 GT/s LGA20 pictureIntel SLG9G Intel.Processor Xeon Quad-Core 2.13 GHz Bus Speed: 1066 MHz Socket 6
$52.0
Intel SLG9G Intel.Processor Xeon Quad-Core 2.13 GHz Bus Speed: 1066 MHz Socket 6 pictureIntel SLC3J Intel.Processor Xeon Eight-Core 2.13 GHz Bus Speed: 6.40 GT/s LGA156
$168.0
Intel SLC3J Intel.Processor Xeon Eight-Core 2.13 GHz Bus Speed: 6.40 GT/s LGA156 picture


Discussions

No Discussions have been posted on this vulnerability.