Red Hat Bugzilla – Bug 134660
CAN-2004-0884 privilege escalation
Last modified: 2007-11-30 17:10:50 EST
Gentoo has reported this issue via vendor-sec on 2004-10-05
Libsasl honors the environment variable SASL_PATH blindly, allowing a
local user to compile a "library" locally that is executed with the
EID of SASL when anything calls libsasl.
I've uploaded the upstream patch as attachment 104781 [details]
Gentoo in the same advisory that corrected CAN-2004-0884
mentioned also a buffer overflow:
"Cyrus-SASL contains a remote buffer overflow in the digestmda5.c file."
Does this overflow affect FC? I can not find what it was.
Looks like it's fixed in 2.1.19: