Linux Security
    Linux Security
    Linux Security

    Debian: cyrus-sasl arbitrary code execution real fix

    Posted By
    This advisory corrects DSA 563-1 which contained a library that caused other programs to fail unindented.
    Debian Security Advisory DSA 563-2                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    October 12th, 2004             
    Package        : cyrus-sasl
    Vulnerability  : unsanitised input
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CAN-2004-0884
    Debian Bug     : 275498
    This advisory corrects DSA 563-1 which contained a library that caused
    other programs to fail unindented.
    For the stable distribution (woody) this problem has been fixed in
    version 1.5.27-3woody3.
    For reference the advisory text follows:
      A vulnerability has been discovered in the Cyrus implementation of
      the SASL library, the Simple Authentication and Security Layer, a
      method for adding authentication support to connection-based
      protocols.  The library honors the environment variable SASL_PATH
      blindly, which allows a local user to link against a malicious
      library to run arbitrary code with the privileges of a setuid or
      setgid application.
      For the unstable distribution (sid) this problem has been fixed in
      version 1.5.28-6.2 of cyrus-sasl and in version 2.1.19-1.3 of
    We recommend that you upgrade your libsasl packages.
    Upgrade Instructions
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
      Source archives:
          Size/MD5 checksum:      711 91b4d0c36b104620ec5d67a95908da5a
          Size/MD5 checksum:    40428 56130ac3dde75943d2f5d594881d4f31
          Size/MD5 checksum:   528252 76ea426e2e2da3b8d2e3a43af5488f3b
      Alpha architecture:
          Size/MD5 checksum:    76226 7450c31b1634f789234dcd045c72ba1c
          Size/MD5 checksum:    19100 80dff5ceced2b6902557e2f2753b2c10
          Size/MD5 checksum:    14944 1ebe9da02e5fa969591472fc1d7d86a2
          Size/MD5 checksum:   172332 d4c236501921a441e5bdbe97f18e3818
          Size/MD5 checksum:    13422 43012f7ffc98161bf238d1eccd124c1b
      ARM architecture:
          Size/MD5 checksum:    70170 d4cdf775981a8f4bb41f4aec28562862
          Size/MD5 checksum:    15038 c34c52e62a3ecd1099daca1146a2c325
          Size/MD5 checksum:    12450 8cc784fd0e7a9f6c3fc8c85440f5d0da
          Size/MD5 checksum:   165914 32d2be1e5f58283b36d65904857c38d7
          Size/MD5 checksum:    10850 bba9b1694a4ea2bbbc533a029b589b26
      Intel IA-32 architecture:
          Size/MD5 checksum:    65292 91c7e706fbc6d6bf211960d8e4811eb2
          Size/MD5 checksum:    13298 433d2d981444495e6ca5e216543c8943
          Size/MD5 checksum:    11754 c97a58448542f29a1067291b52b94780
          Size/MD5 checksum:   162896 3b0e73e6f1425d9c5fad18377961d84b
          Size/MD5 checksum:    11078 ab906f86340a0b5c5f0bb3df8cdd5c9b
      Intel IA-64 architecture:
          Size/MD5 checksum:    83792 05302af9b91315c201c9c92cd5fe61ff
          Size/MD5 checksum:    23252 c86b8f1bc3b75a25e05c5c63738c3e4e
          Size/MD5 checksum:    19964 75a969bda18dbd3b6d9b8a5a257ed71e
          Size/MD5 checksum:   180990 d03f4ab68d2e9934561ed1852671df3d
          Size/MD5 checksum:    14238 133ec7ac7d983036bd0b098856239272
      HP Precision architecture:
          Size/MD5 checksum:    75324 0b802ea7f227d06d0de2b1d6c255d3ba
          Size/MD5 checksum:    18286 2ee50c0ea3d8d2904d737edbf6f51736
          Size/MD5 checksum:    15470 ab652ce834c1a1946009402886a940bb
          Size/MD5 checksum:   171242 d83593d56f74ee92998a804dbb2cf67c
          Size/MD5 checksum:    11904 9484fe5429cda40dc6083537dd17426b
      Motorola 680x0 architecture:
          Size/MD5 checksum:    64738 a4b399d98655e6ee77241227ee86c2e2
          Size/MD5 checksum:    13102 1c3e8fa88d42d621420fb9d8e1607573
          Size/MD5 checksum:    11804 0608eb94698ee5fc87159f686f34d039
          Size/MD5 checksum:   162838 ba3d43e64daec7da2a2eeb47c394db8a
          Size/MD5 checksum:    10908 8f70e837ed7167d96b5ca9e4fd55c9e9
      Big endian MIPS architecture:
          Size/MD5 checksum:    72916 8c174e6a6e519114662ee701f4200936
          Size/MD5 checksum:    15946 b18ecabdb2e35db13beffca809e23487
          Size/MD5 checksum:    13346 d1764e156b4ed3c1e5f7eaf2a559bcf0
          Size/MD5 checksum:   165812 960d06d45f9740419f9c0b73b593c3bd
          Size/MD5 checksum:    11318 11682f55a6c99e156d6314f92dd4aa0b
      Little endian MIPS architecture:
          Size/MD5 checksum:    72966 c9b7a298d89d3c7d9c7e36ee7f463ad9
          Size/MD5 checksum:    16262 fd4ca17e75656bfe0e49686fc746ca54
          Size/MD5 checksum:    13292 3bf13fa11ea13520fda7491ec27948df
          Size/MD5 checksum:   165918 76d312c85fb2393fe6c2d0ffbf6689e3
          Size/MD5 checksum:    11280 3e3bda9496b303fc6e1e053b9fb723de
      PowerPC architecture:
          Size/MD5 checksum:    70918 6eee1277a09b70eb561aec3eff80111a
          Size/MD5 checksum:    16076 592393749a7d6475d8cb5cf5d5d901cf
          Size/MD5 checksum:    13468 83bc3efbfd45d77fdd7a6d93c9417a90
          Size/MD5 checksum:   166594 ecb898c16ad7b6350ac0aadb369320d6
          Size/MD5 checksum:    11002 402a89f71a142ba2ccb5189211d8a12e
      IBM S/390 architecture:
          Size/MD5 checksum:    67026 9b21bb28b3a4c8cee9de0b35da4f7cf0
          Size/MD5 checksum:    14410 72ab4e29865eb17710ec25189c5f535d
          Size/MD5 checksum:    12392 a5a3dc484a9733e0b3e404d2589f8915
          Size/MD5 checksum:   165406 3f8dec1387c80bfeaf8d2878f3f8acbc
          Size/MD5 checksum:    11626 d08b68882e58c36950a998a081a3b5d5
      Sun Sparc architecture:
          Size/MD5 checksum:    68252 52186d78b3ad3fb76c5fe707d77d9b75
          Size/MD5 checksum:    14802 d2b0a39fa2e4dac6836ff1cc4b179838
          Size/MD5 checksum:    11908 3e58d976ae3867e9e8829b5956f2271a
          Size/MD5 checksum:   164874 9632f56622cd4cb1f0489b8188da45dd
          Size/MD5 checksum:    13556 fb4002c8597e495fef0c3ff410442534
      These files will probably be moved into the stable distribution on
      its next update.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"125","title":"Yes","votes":"45","type":"x","order":"1","pct":83.33,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":16.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.