Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Cyrus-SASL: Denial of Service
Informations
Name GLSA-201309-01 First vendor Publication 2013-09-01
Vendor Gentoo Last vendor Modification 2013-09-01
Severity (Vendor) Normal Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A NULL pointer dereference in Cyrus-SASL may allow remote attackers to cause a Denial of Service condition.

Background

Cyrus-SASL is an implementation of the Simple Authentication and Security Layer.

Description

In the GNU C Library (glibc) from version 2.17 onwards, the crypt()
function call can return NULL when the salt violates specifications or the system is in FIPS-140 mode and a DES or MD5 hashed password is passed. When Cyrus-SASL's authentication mechanisms call crypt(), a NULL may be returned.

Impact

A remote attacker could trigger this vulnerability to cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All Cyrus-SASL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.26-r3"

References

[ 1 ] CVE-2013-4122 : http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4122

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201309-01.xml

Original Source

Url : http://security.gentoo.org/glsa/glsa-201309-01.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19157
 
Oval ID: oval:org.mitre.oval:def:19157
Title: USN-1988-1 -- cyrus-sasl2 vulnerability
Description: Cyrus SASL could be made to crash if it processed specially crafted input.
Family: unix Class: patch
Reference(s): USN-1988-1
CVE-2013-4122
Version: 5
Platform(s): Ubuntu 13.04
Product(s): cyrus-sasl2
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

Nessus® Vulnerability Scanner

Date Description
2015-10-01 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2755-1.nasl - Type : ACT_GATHER_INFO
2015-09-28 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3368.nasl - Type : ACT_GATHER_INFO
2014-10-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-338.nasl - Type : ACT_GATHER_INFO
2013-10-10 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1988-1.nasl - Type : ACT_GATHER_INFO
2013-09-02 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201309-01.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-02-17 11:37:42
  • Multiple Updates
2013-10-29 00:22:36
  • Multiple Updates
2013-10-27 13:22:06
  • Multiple Updates
2013-09-02 00:21:20
  • First insertion