CVE-2009-0688

Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
certccCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
carnegie_mellon_universitycyrus-sasl
𝑥
≤ 2.1.22
carnegie_mellon_universitycyrus-sasl
1.4.1
carnegie_mellon_universitycyrus-sasl
1.5.0
carnegie_mellon_universitycyrus-sasl
1.5.2
carnegie_mellon_universitycyrus-sasl
1.5.3
carnegie_mellon_universitycyrus-sasl
1.5.5
carnegie_mellon_universitycyrus-sasl
1.5.10
carnegie_mellon_universitycyrus-sasl
1.5.11
carnegie_mellon_universitycyrus-sasl
1.5.13
carnegie_mellon_universitycyrus-sasl
1.5.15
carnegie_mellon_universitycyrus-sasl
1.5.16
carnegie_mellon_universitycyrus-sasl
1.5.20
carnegie_mellon_universitycyrus-sasl
1.5.21
carnegie_mellon_universitycyrus-sasl
1.5.22
carnegie_mellon_universitycyrus-sasl
1.5.23
carnegie_mellon_universitycyrus-sasl
1.5.24
carnegie_mellon_universitycyrus-sasl
1.5.26
carnegie_mellon_universitycyrus-sasl
1.5.27
carnegie_mellon_universitycyrus-sasl
1.5.28
carnegie_mellon_universitycyrus-sasl
2.0.0
carnegie_mellon_universitycyrus-sasl
2.0.1
carnegie_mellon_universitycyrus-sasl
2.0.2
carnegie_mellon_universitycyrus-sasl
2.0.3
carnegie_mellon_universitycyrus-sasl
2.0.4
carnegie_mellon_universitycyrus-sasl
2.0.5
carnegie_mellon_universitycyrus-sasl
2.1.0
carnegie_mellon_universitycyrus-sasl
2.1.1
carnegie_mellon_universitycyrus-sasl
2.1.2
carnegie_mellon_universitycyrus-sasl
2.1.3
carnegie_mellon_universitycyrus-sasl
2.1.5
carnegie_mellon_universitycyrus-sasl
2.1.6
carnegie_mellon_universitycyrus-sasl
2.1.7
carnegie_mellon_universitycyrus-sasl
2.1.8
carnegie_mellon_universitycyrus-sasl
2.1.9
carnegie_mellon_universitycyrus-sasl
2.1.10
carnegie_mellon_universitycyrus-sasl
2.1.11
carnegie_mellon_universitycyrus-sasl
2.1.12
carnegie_mellon_universitycyrus-sasl
2.1.13
carnegie_mellon_universitycyrus-sasl
2.1.14
carnegie_mellon_universitycyrus-sasl
2.1.15
carnegie_mellon_universitycyrus-sasl
2.1.16
carnegie_mellon_universitycyrus-sasl
2.1.17
carnegie_mellon_universitycyrus-sasl
2.1.18
carnegie_mellon_universitycyrus-sasl
2.1.19
carnegie_mellon_universitycyrus-sasl
2.1.20
carnegie_mellon_universitycyrus-sasl
2.1.21
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cyrus-sasl2
bullseye
2.1.27+dfsg-2.1+deb11u1
fixed
bullseye (security)
2.1.27+dfsg-2.1+deb11u1
fixed
bookworm
2.1.28+dfsg-10
fixed
sid
2.1.28+dfsg1-8
fixed
trixie
2.1.28+dfsg1-8
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cyrus-sasl2
jaunty
Fixed 2.1.22.dfsg1-23ubuntu3.1
released
intrepid
Fixed 2.1.22.dfsg1-21ubuntu2.1
released
hardy
Fixed 2.1.22.dfsg1-18ubuntu2.1
released
dapper
Fixed 2.1.19.dfsg1-0.1ubuntu3.1
released
References