CVE-2005-0373 Affecting cyrus-sasl2 package, versions <2.1.19.dfsg1-0sarge2
Threat Intelligence
EPSS
3.46% (92nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-CYRUSSASL2-338970
- published 7 Oct 2004
- disclosed 7 Oct 2004
Introduced: 7 Oct 2004
CVE-2005-0373 Open this link in a new tabHow to fix?
Upgrade Debian:unstable cyrus-sasl2 to version 2.1.19.dfsg1-0sarge2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cyrus-sasl2 package and not the cyrus-sasl2 package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
References
- https://security-tracker.debian.org/tracker/CVE-2005-0373
- http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml
- https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171
- https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup
- http://www.linuxcompatible.org/print42495.html
- http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html
- http://www.securityfocus.com/bid/11347
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17642
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:054
CVSS Scores
version 3.1