Courier Authentication Library: SQL injection vulnerability — GLSA 200809-05

An SQL injection vulnerability has been discovered in the Courier Authentication Library.

Affected packages

net-libs/courier-authlib on all architectures
Affected versions < 0.60.6
Unaffected versions >= 0.60.6

Background

The Courier Authentication Library is a generic authentication API that encapsulates the process of validating account passwords.

Description

It has been discovered that some input (e.g. the username) passed to the library are not properly sanitised before being used in SQL queries.

Impact

A remote attacker could provide specially crafted input to the library, possibly resulting in the remote execution of arbitrary SQL commands. NOTE: Exploitation of this vulnerability requires that a MySQL database is used for authentication and that a Non-Latin character set is selected.

Workaround

There is no known workaround at this time.

Resolution

All Courier Authentication Library users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/courier-authlib-0.60.6"

References

Release date
September 05, 2008

Latest revision
September 05, 2008: 01

Severity
normal

Exploitable
remote

Bugzilla entries