Gentoo Logo

Courier Authentication Library: SQL injection vulnerability


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200809-05 / courier-authlib
Release Date September 05, 2008
Latest Revision September 05, 2008: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-libs/courier-authlib < 0.60.6 >= 0.60.6 All supported architectures

Related bugreports: #225407


An SQL injection vulnerability has been discovered in the Courier Authentication Library.

2.  Impact Information


The Courier Authentication Library is a generic authentication API that encapsulates the process of validating account passwords.


It has been discovered that some input (e.g. the username) passed to the library are not properly sanitised before being used in SQL queries.


A remote attacker could provide specially crafted input to the library, possibly resulting in the remote execution of arbitrary SQL commands. NOTE: Exploitation of this vulnerability requires that a MySQL database is used for authentication and that a Non-Latin character set is selected.

3.  Resolution Information


There is no known workaround at this time.


All Courier Authentication Library users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/courier-authlib-0.60.6"

4.  References


Page updated September 05, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.