National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2002-1347 Detail

Description

Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.

Source:  MITRE      Last Modified:  12/18/2002

Quick Info

CVE Dictionary Entry:
CVE-2002-1347
Original release date:
12/18/2002
Last revised:
07/10/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
7.5 HIGH
Vector:
(AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact Subscore:
6.4
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Provides user account access, Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html External Source SUSE SuSE-SA:2002:048
http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557 External Source CONECTIVA 000557
http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html External Source APPLE APPLE-SA-2005-03-21
http://marc.info/?l=bugtraq&m=103946297703402&w=2 External Source BUGTRAQ 20021209 Cyrus SASL library buffer overflows
http://www.debian.org/security/2002/dsa-215 External Source DEBIAN DSA-215
http://www.redhat.com/support/errata/RHSA-2002-283.html External Source REDHAT RHSA-2002:283
http://www.securityfocus.com/advisories/4826 External Source GENTOO 200212-10
http://www.securityfocus.com/bid/6347 External Source BID 6347
http://www.securityfocus.com/bid/6348 External Source BID 6348
http://www.securityfocus.com/bid/6349 External Source BID 6349
https://exchange.xforce.ibmcloud.com/vulnerabilities/10810 External Source XF cyrus-sasl-username-bo(10810)
https://exchange.xforce.ibmcloud.com/vulnerabilities/10811 External Source XF cyrus-sasl-saslauthd-bo(10811)
https://exchange.xforce.ibmcloud.com/vulnerabilities/10812 External Source XF cyrus-sasl-logwriter-bo(10812)

Technical Details

Vulnerability Type (View All)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:cyrus:sasl:*:*:*:*:*:*:*:*    versions up to (including) 2.1.9

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 3 change records found - show changes