CVE-2005-0373

Properties

Published:
06.10.2004
Updated:
20.10.2005
Patch available:
Severity:
High
CVSS vector:
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N) Approximated
Product:
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X
Apple: Mac OS X

Vulnerability description

Buffer overflow in digestmd5.c CVS release 1.170 (also referred to as digestmda5.c), as used in the DIGEST-MD5 SASL plugin for Cyrus-SASL but not in any official releases, allows remote attackers to execute arbitrary code.

References:

CONFIRM: https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup
CONFIRM: https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171
MLIST: http://www.monkey.org/openbsd/archive/ports/0407/msg00265.html
GENTOO: http://www.gentoo.org/security/en/glsa/glsa-200410-05.xml
MANDRAKE: http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:054
SUSE: http://www.linuxcompatible.org/print42495.html
BID: http://www.securityfocus.com/bid/11347
XF: http://xforce.iss.net/xforce/xfdb/17642
CONFIRM: https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c?rev=1.171&content-type=text/x-cvsweb-markup
CONFIRM: https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c.diff?r1=1.170&r2=1.171