Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2002-1347


Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.


Published

2002-12-18T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-131

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cyrusimap cyrus_sasl ≤ 2.1.9 Yes
Operating System apple mac_os_x < 10.3.8 Yes
Operating System apple mac_os_x_server < 10.3.8 Yes

References