Cyrus SASL Multiple Remote And Local Vulnerabilities

Bugtraq ID: 11347
Class: Boundary Condition Error
CVE: CVE-2004-0884
CVE-2005-0373
Remote: Yes
Local: Yes
Published: Oct 07 2004 12:00AM
Updated: Jul 12 2009 07:06AM
Credit: The individual or individuals responsible for disclosure of these issues are currently unknown; these issues were disclosed in the referenced Gentoo advisory.
Vulnerable: SuSE Linux Enterprise Server 9
SuSE Linux Desktop 1.0
SuSE Linux 8.1
SuSE Linux 8.0 i386
SuSE Linux 8.0
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. cvsup-16.1h-36.i586.rpm
+ S.u.S.E. Linux Personal 9.0
Redhat Fedora Core1
OpenPKG OpenPKG 2.2
OpenPKG OpenPKG 2.1
Cyrus-Utils SASL 2.1.18 -r1
+ Gentoo Linux 1.4
Cyrus-Utils SASL 2.1.18
Cyrus-Utils SASL 2.1.17
Cyrus-Utils SASL 2.1.16
Cyrus-Utils SASL 2.1.15
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Redhat Desktop 3.0
+ Redhat Enterprise Linux AS 3
+ Redhat Enterprise Linux ES 3
+ Redhat Enterprise Linux WS 3
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Cyrus-Utils SASL 2.1.14
Cyrus-Utils SASL 2.1.13
Cyrus-Utils SASL 2.1.12
Cyrus-Utils SASL 2.1.11
Cyrus-Utils SASL 2.1.10
Cyrus-Utils SASL 2.1.9
+ Redhat Linux 8.0 i386
+ Redhat Linux 8.0
Cyrus-Utils SASL 1.5.28
Cyrus-Utils SASL 1.5.27
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
Cyrus-Utils SASL 1.5.24
+ Redhat Advanced Workstation for the Itanium Processor 2.1 IA64
+ Redhat Advanced Workstation for the Itanium Processor 2.1
+ Redhat Enterprise Linux AS 2.1
+ Redhat Enterprise Linux ES 2.1
+ Redhat Enterprise Linux WS 2.1
+ Redhat Linux Advanced Work Station 2.1
Apple Mac OS X Server 10.3.8
Apple Mac OS X Server 10.3.7
Apple Mac OS X Server 10.3.6
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X Server 10.2.7
Apple Mac OS X Server 10.2.6
Apple Mac OS X Server 10.2.5
Apple Mac OS X Server 10.2.4
Apple Mac OS X Server 10.2.3
Apple Mac OS X Server 10.2.2
Apple Mac OS X Server 10.2.1
Apple Mac OS X Server 10.2
Apple Mac OS X Server 10.1.5
Apple Mac OS X Server 10.1.4
Apple Mac OS X Server 10.1.3
Apple Mac OS X Server 10.1.2
Apple Mac OS X Server 10.1.1
Apple Mac OS X Server 10.1
Apple Mac OS X Server 10.0
Apple Mac OS X 10.3.8
Apple Mac OS X 10.3.7
Apple Mac OS X 10.3.6
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3
Apple Mac OS X 10.2.8
Apple Mac OS X 10.2.7
Apple Mac OS X 10.2.6
Apple Mac OS X 10.2.5
Apple Mac OS X 10.2.4
Apple Mac OS X 10.2.3
Apple Mac OS X 10.2.2
Apple Mac OS X 10.2.1
Apple Mac OS X 10.2
Apple Mac OS X 10.1.5
Apple Mac OS X 10.1.4
Apple Mac OS X 10.1.3
Apple Mac OS X 10.1.2
Apple Mac OS X 10.1.1
Apple Mac OS X 10.1
Apple Mac OS X 10.1
Apple Mac OS X 10.0.4
Apple Mac OS X 10.0.3
Apple Mac OS X 10.0.2
Apple Mac OS X 10.0.1
Apple Mac OS X 10.0 3
Apple Mac OS X 10.0
Not Vulnerable: Cyrus-Utils SASL 2.1.18 -r2


 

Privacy Statement
Copyright 2010, SecurityFocus