cyrus-sasl 缓冲区错误漏洞

admin 2024-01-14 01:26:02 YS 来源:ZONE.CI 全球网 0 阅读模式
> cyrus-sasl 缓冲区错误漏洞

cyrus-sasl 缓冲区错误漏洞

CNNVD-ID编号 CNNVD-201912-934 CVE编号 CVE-2019-19906
发布时间 2019-12-19 更新时间 2021-01-21
漏洞类型 缓冲区错误 漏洞来源 Ubuntu,Debian,Red Hat
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

cyrus-sasl是一款能够在客户端和服务端提供身份验证授权服务的Cyrus SASL(简单身份验证安全层)API的实现。

cyrus-sasl 2.1.27版本中存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。

漏洞补丁

目前厂商已发布升级了cyrus-sasl 缓冲区错误漏洞的补丁,cyrus-sasl 缓冲区错误漏洞的补丁获取链接:

参考网址

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/

来源:www.openldap.org

链接:https://www.openldap.org/its/index.cgi/Incoming?id=9123

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2019/Dec/42

来源:MISC

链接:https://github.com/cyrusimap/cyrus-sasl/issues/587

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html

来源:FULLDISC

链接:http://seclists.org/fulldisclosure/2020/Jul/24

来源:UBUNTU

链接:https://usn.ubuntu.com/4256-1/

来源:FULLDISC

链接:http://seclists.org/fulldisclosure/2020/Jul/23

来源:DEBIAN

链接:https://www.debian.org/security/2019/dsa-4591

来源:CONFIRM

链接:https://support.apple.com/kb/HT211289

来源:CONFIRM

链接:https://support.apple.com/kb/HT211288

来源:lists.debian.org

链接:https://lists.debian.org/debian-security-announce/2019/msg00245.html

来源:lists.debian.org

链接:https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4256-1/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158457/Apple-Security-Advisory-2020-07-15-2.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2019-19906

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160125/Red-Hat-Security-Advisory-2020-5149-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160961/Red-Hat-Security-Advisory-2021-0146-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3849/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Cyrus-SASL-buffer-overflow-via-sasl-add-string-31207

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155756/Debian-Security-Advisory-4591-1.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0004/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4100/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2430/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0310/

来源:support.apple.com

链接:https://support.apple.com/kb/HT211288

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156112/Ubuntu-Security-Notice-USN-4256-1.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-vyatta-5600-vrouter-software-patches-release-1801-ze-2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4503/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4513/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0099/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0234/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160889/Red-Hat-Security-Advisory-2021-0050-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159824/Red-Hat-Security-Advisory-2020-4497-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0171/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201912-934

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  1