4.3
CVSSv2

CVE-2013-4122

Published: 27/10/2013 Updated: 08/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Cyrus SASL 2.1.23, 2.1.26, and previous versions does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote malicious users to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference.

Vulnerable Product Search on Vulmon Subscribe to Product

cmu cyrus-sasl 2.1.22

cmu cyrus-sasl 2.1.21

cmu cyrus-sasl 2.1.24

cmu cyrus-sasl 2.1.25

cmu cyrus-sasl 1.5.28

cmu cyrus-sasl 2.1.20

cmu cyrus-sasl 2.1.19

cmu cyrus-sasl

cmu cyrus-sasl 2.1.23

Vendor Advisories

Debian Bug report logs - #716835 cyrus-sasl2: CVE-2013-4122: NULL pointer dereference Package: cyrus-sasl2; Maintainer for cyrus-sasl2 is Debian Cyrus Team <team+cyrus@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 13 Jul 2013 12:33:01 UTC Severity: important Tags: patch, securi ...
Cyrus SASL could be made to crash if it processed specially crafted input ...
Cyrus SASL could be made to crash if it processed specially crafted input ...
It was discovered that cyrus-sasl2, a library implementing the Simple Authentication and Security Layer, does not properly handle certain invalid password salts A remote attacker can take advantage of this flaw to cause a denial of service For the stable distribution (jessie), this problem has been fixed in version 2126dfsg1-13+deb8u1 For the ...
Cyrus SASL 2123, 2126, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 217 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted passw ...
Cyrus SASL 2123, 2126, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 217 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted passw ...