ID CVE-2002-2043
Summary SQL injection vulnerability in the LDAP and MySQL authentication patch for Cyrus SASL 1.5.24 and 1.5.27 allows remote attackers to execute arbitrary SQL commands and log in as arbitrary POP mail users via the password.
References
Vulnerable Configurations
  • cpe:2.3:a:cyrus:sasl:1.5.24:*:*:*:*:*:*:*
    cpe:2.3:a:cyrus:sasl:1.5.24:*:*:*:*:*:*:*
  • cpe:2.3:a:cyrus:sasl:1.5.27:*:*:*:*:*:*:*
    cpe:2.3:a:cyrus:sasl:1.5.27:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 4409
bugtraq 20020402 SASL (v1/v2) MYSQL/LDAP authentication patch.
xf cyrus-sasl-patch-pop-access(8748)
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement Not vulnerable. This issue only affects a third-party patch to Cyrus SASL, not distributed with Red Hat Enterprise Linux 2.1, 3, or 4.
Last major update 05-09-2008 - 20:32
Published 31-12-2002 - 05:00
Last modified 05-09-2008 - 20:32
Back to Top