Bug 149751 - Remote buffer overflow in the digestmd5.c
Remote buffer overflow in the digestmd5.c
Status: CLOSED NOTABUG
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: cyrus-sasl (Show other bugs)
3.0
All Linux
medium Severity medium
: ---
: ---
Assigned To: Nalin Dahyabhai
Brian Brock
http://www.gentoo.org/security/en/gls...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-02-25 17:02 EST by Leonard den Ottolander
Modified: 2007-11-30 17:07 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-03-01 17:02:40 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Leonard den Ottolander 2005-02-25 17:02:13 EST
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0373

Affects RHEL 3 and 4. Please check whether it affects RHEL 2.1.
Comment 2 Leonard den Ottolander 2005-02-25 17:55:15 EST
Does not affect RHEL 4 (2.1.19). Does affect RHEL 3 (2.1.18). Not sure
about RHEL 2.1.
Comment 3 Leonard den Ottolander 2005-02-28 17:06:37 EST
https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c#rev1.171
:

        * plugins/digestmd5.c: Fix potential buffer overflow, call
          add_to_challenge in 2 more places (Alexey Melnikov

So indeed the issue seems to be the sprintf(text->outbuf)s, not the
quoting.
Comment 4 Leonard den Ottolander 2005-03-01 17:02:40 EST
Alexey Melnikov verified that this issue only exists in rev 1.170 of
digestmd5.c. Official releases are hence not vulnerable.

Closing NOTABUG.

Note You need to log in before you can comment on or make changes to this bug.