Gentoo Logo

Cyrus-SASL: Execution of arbitrary code


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200907-09 / cyrus-sasl
Release Date July 12, 2009
Latest Revision July 12, 2009: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
dev-libs/cyrus-sasl < 2.1.23 >= 2.1.23 All supported architectures

Related bugreports: #270261


A buffer overflow in Cyrus-SASL might allow for the execution of arbitrary code in applications or daemons that authenticate using SASL.

2.  Impact Information


Cyrus-SASL is an implementation of the Simple Authentication and Security Layer.


James Ralston reported that in certain situations, Cyrus-SASL does not properly terminate strings which can result in buffer overflows when performing Base64 encoding.


A remote unauthenticated user might send specially crafted packets to a daemon using Cyrus-SASL, possibly resulting in the execution of arbitrary code with the privileges of the user running the daemon or a Denial of Service.

3.  Resolution Information


There is no known workaround at this time.


All Cyrus-SASL users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.23"

4.  References


Page updated July 12, 2009

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.