CVE-2004-0884 Affecting cyrus-sasl2 package, versions <2.1.19-1.3
Threat Intelligence
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-CYRUSSASL2-338978
- published 27 Jan 2005
- disclosed 27 Jan 2005
Introduced: 27 Jan 2005
CVE-2004-0884 Open this link in a new tabHow to fix?
Upgrade Debian:unstable cyrus-sasl2 to version 2.1.19-1.3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cyrus-sasl2 package and not the cyrus-sasl2 package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
References
- https://security-tracker.debian.org/tracker/CVE-2004-0884
- http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
- http://www.debian.org/security/2004/dsa-563
- http://www.debian.org/security/2004/dsa-568
- http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml
- http://marc.info/?l=bugtraq&m=110693126007214&w=2
- https://bugzilla.fedora.us/show_bug.cgi?id=2137
- http://www.ciac.org/ciac/bulletins/p-003.shtml
- http://www.trustix.net/errata/2004/0053/
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11678
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=134657
- http://rhn.redhat.com/errata/RHSA-2004-546.html
- http://www.securityfocus.com/bid/11347
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17643
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:106
CVSS Scores
version 3.1