SuSE: 2005-013: cyrus-sasl remote code execution Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: cyrus-sasl,cyrus-sasl2
Announcement-ID: SUSE-SA:2005:013
Date: Thu, 03 Mar 2005 11:00:00 +0000
Affected products: 8.2, 9.0, 9.1, 9.2
SUSE Linux Desktop 1.0
SUSE Linux Enterprise Server 8, 9
Novell Linux Desktop 9
Vulnerability Type: remote code execution
Severity (1-10): 8
SUSE default package: yes
Cross References: CAN-2005-0373
Content of this advisory:
1) security vulnerability resolved:
remote buffer overflow in digestmda5
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
none
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
cyrus-sasl is a library providing authentication services.
A buffer overflow in the digestmda5 code was identified that could lead
to a remote attacker executing code in the context of the service using
sasl authentication.
This is tracked by the Mitre CVE ID CAN-2005-0373.
2) solution/workaround
Please install the upgraded packages.
3) special instructions and notes
Please restart services using cyrus-sasl for authentication.
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
3c8e2d18989cc3503e443eb7fb9cb83d
bfcc587c9b808fae4409019099be779e
SUSE Linux 9.0:
edc54c6bd2e076a20c28c04c1c81c74d
2c622b4f23c2391b4ee4761face45d3a
SUSE Linux 8.2:
9cbb07d4de227affcd4dc151e73ef2d3
x86-64 Platform:
SUSE Linux 9.1:
c843a67b5643930310efd2126c664e1c
source rpm(s):
908c30cba8e5407dd0124ad0919b6248
SUSE Linux 9.0:
c9fd563dc21800f7a857b22d70abe55a
source rpm(s):
8bd0c8cd338120daf7e76c52c137cc9e
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
See SUSE Security Summary Report.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References