Bug 148871

Summary: CAN-2005-0373 buffer overflow in cyrus-sasl digest-md5 plugin
Product: Red Hat Enterprise Linux 3 Reporter: Josh Bressers <bressers>
Component: cyrus-saslAssignee: Nalin Dahyabhai <nalin>
Status: CLOSED NOTABUG QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 3.0CC: mjc
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-02-24 17:10:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2005-02-16 14:39:01 UTC
Buffer overflow in digestmda5.c in Cyrus-SASL before 2.1.18-r1 allows remote
attackers to execute arbitrary code.
       
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.167&r2=1.172

I'm not entirely sure of the real impact of this issue since I don't completely
understand the usage of cyrus-sasl.

This issue may also affect RHEL2.1

Comment 1 Nalin Dahyabhai 2005-02-22 20:20:27 UTC
Almost certainly a false alarm, per
http://www.irbs.net/internet/cyrus-sasl/0408/0059.html

Comment 2 Josh Bressers 2005-02-24 15:25:01 UTC
Nalin,

I'm inclined to agree.  Here is the CVS commit in question:
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup

After looking over our code, and that code, we're fine.

If you agree, please close this as not a bug.

Comment 3 Nalin Dahyabhai 2005-02-24 17:10:47 UTC
Thanks Josh, will do.