|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0373: cyrus-sasl: buffer overflow in digestmda5.c | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Thomas Biege <thomas> |
| Component: | Incidents | Assignee: | Carsten Hoeger <choeger> |
| Status: | VERIFIED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | patch-request, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2005-0373: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Thomas Biege
2005-02-16 19:33:57 UTC
<!-- SBZ_reproduce --> - I checked in all relevant sasl packages Hm, are the suse-dist mails are missing? done SM-Tracker-413 /work/src/done/PATCHINFO/cyrus-sasl.patch.box /work/src/done/PATCHINFO/cyrus-sasl.patch.maintained advisory and updated packages released. Hello Marcus, This is a false alarm. The buffer overflow only exists in rev.1.170 of digestmd5.c and was fixed in rev.1.171. See below message for details. Please contact Alexey directly for details. Also compare RH bugzilla https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148871 . Regards, Leonard den Ottolander. -----Forwarded Message----- From: Alexey Melnikov <alexey.melnikov@isode.com> To: Leonard den Ottolander <leonard@den.ottolander.nl> Subject: Re: CAN-2005-0373 Date: Tue, 01 Mar 2005 17:23:14 +0000 Leonard den Ottolander wrote: >Hello Alexey, > >(Hope you don't mind me contacting you without having been introduced >before.) > >I'm investigation CAN-2005-0373. > >https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sasl/plugins/digestmd5.c +#rev1.171 : > * plugins/digestmd5.c: Fix potential buffer overflow, call > add_to_challenge in 2 more places (Alexey Melnikov > >Does this mean the sprintf(text->outbuf)s are the issue? Or is it >the quoting that is introduced in this revision that fixes the overflow? > > I've intoruduced a buffer overflow in revision 1.170, because not enough space was allocated when quoting was required. I've fixed that in 1.171. 1.170 is an intermediate revision, which was not part of any official release, so people shouldn't be worried. Alexey CVE-2005-0373: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) |