Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-0688

Publication date 15 May 2009

Last updated 24 July 2024


Ubuntu priority

Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.

Read the notes from the security team

Status

Package Ubuntu Release Status
cyrus-sasl2 9.04 jaunty
Fixed 2.1.22.dfsg1-23ubuntu3.1
8.10 intrepid
Fixed 2.1.22.dfsg1-21ubuntu2.1
8.04 LTS hardy
Fixed 2.1.22.dfsg1-18ubuntu2.1
6.06 LTS dapper
Fixed 2.1.19.dfsg1-0.1ubuntu3.1

Notes


jdstrand

applying upstream patch could break existing applications


mdeslaur

since the change breaks ABI, redhat updated applications that used cyrus-sasl2 improperly instead. They have released a cyrus-imapd update. See redhat bug for more info. sendmail: https://bugzilla.redhat.com/show_bug.cgi?id=504186


kees

cyrus-imapd-2.2: https://bugzilla.redhat.com/show_bug.cgi?id=504207

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
cyrus-sasl2

References

Related Ubuntu Security Notices (USN)

    • USN-790-1
    • Cyrus SASL vulnerability
    • 24 June 2009

Other references