Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.
References
Link | Resource |
---|---|
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup | Vendor Advisory |
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171 | Vendor Advisory |
http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html | Patch Vendor Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml | Patch Vendor Advisory |
http://www.linuxcompatible.org/print42495.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/11347 | Patch Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:054 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17642 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2004-10-06 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-0373
Mitre link : CVE-2005-0373
JSON object : View
CWE
Products Affected
apple
- mac_os_x_server
- mac_os_x
suse
- suse_cvsup
- suse_linux
openpkg
- openpkg
cyrus
- sasl
redhat
- fedora_core
conectiva
- linux