Bug 148871 - CAN-2005-0373 buffer overflow in cyrus-sasl digest-md5 plugin
Summary: CAN-2005-0373 buffer overflow in cyrus-sasl digest-md5 plugin
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: cyrus-sasl
Version: 3.0
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nalin Dahyabhai
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2005-02-16 14:39 UTC by Josh Bressers
Modified: 2007-11-30 22:07 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-02-24 17:10:47 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2005-02-16 14:39:01 UTC
Buffer overflow in digestmda5.c in Cyrus-SASL before 2.1.18-r1 allows remote
attackers to execute arbitrary code.
       
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.167&r2=1.172

I'm not entirely sure of the real impact of this issue since I don't completely
understand the usage of cyrus-sasl.

This issue may also affect RHEL2.1

Comment 1 Nalin Dahyabhai 2005-02-22 20:20:27 UTC
Almost certainly a false alarm, per
http://www.irbs.net/internet/cyrus-sasl/0408/0059.html

Comment 2 Josh Bressers 2005-02-24 15:25:01 UTC
Nalin,

I'm inclined to agree.  Here is the CVS commit in question:
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup

After looking over our code, and that code, we're fine.

If you agree, please close this as not a bug.

Comment 3 Nalin Dahyabhai 2005-02-24 17:10:47 UTC
Thanks Josh, will do.


Note You need to log in before you can comment on or make changes to this bug.