Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTA-2009-AVI-194
Vulnerability from certfr_avis
Une vulnérabilité présente dans Cyrus SASL permet à un utilisateur malintentionné distant de provoquer un déni de service ou d'exécuter du code arbitraire.
Description
Cyrus SASL (Simple Authentication and Security Layer) est une bibliothèque de fonctions pouvant être utilisée par des applications afin de mettre en œuvre un mécanisme d'authentification pour divers protocoles. Une vulnérabilité de type débordement de mémoire dans une fonction de cette bibliothèque permet à un utilisateur distant de provoquer un déni de service des applications s'appuyant sur Cyrus SASL ou d'exécuter du code arbitraire dans le contexte de ces mêmes applications.
Solution
La version 2.1.23 corrige le problème :
ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz
Cyrus SASL versions 2.1.22 et antérieures.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cp\u003eCyrus SASL versions 2.1.22 et ant\u00e9rieures.\u003c/p\u003e", "content": "## Description\n\nCyrus SASL (Simple Authentication and Security Layer) est une\nbiblioth\u00e8que de fonctions pouvant \u00eatre utilis\u00e9e par des applications\nafin de mettre en \u0153uvre un m\u00e9canisme d\u0027authentification pour divers\nprotocoles. Une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans une\nfonction de cette biblioth\u00e8que permet \u00e0 un utilisateur distant de\nprovoquer un d\u00e9ni de service des applications s\u0027appuyant sur Cyrus SASL\nou d\u0027ex\u00e9cuter du code arbitraire dans le contexte de ces m\u00eames\napplications.\n\n## Solution\n\nLa version 2.1.23 corrige le probl\u00e8me :\n\n ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz\n", "cves": [ { "name": "CVE-2009-0688", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0688" } ], "initial_release_date": "2009-05-19T00:00:00", "last_revision_date": "2009-05-19T00:00:00", "links": [ { "title": "Note de vuln\u00e9rabilit\u00e9 de l\u0027US-CERT VU#238019 du 15 mai 2009 :", "url": "http://www.kb.cert.org/vuls/id/238019" }, { "title": "Bulletin du NIST CVE-2009-0688 du 22 f\u00e9vrier 2009 :", "url": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0688" } ], "reference": "CERTA-2009-AVI-194", "revisions": [ { "description": "version initiale.", "revision_date": "2009-05-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans Cyrus SASL permet \u00e0 un utilisateur\nmalintentionn\u00e9 distant de provoquer un d\u00e9ni de service ou d\u0027ex\u00e9cuter du\ncode arbitraire.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Cyrus SASL", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 de l\u0027US-CERT VU#238019 du 14 mai 2009", "url": null } ] }
CVE-2009-0688 (GCVE-0-2009-0688)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54515", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/54515" }, { "name": "35239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35239" }, { "name": "TA10-103B", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html" }, { "name": "35321", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35321" }, { "name": "VU#238019", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/238019" }, { "name": "35497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35497" }, { "name": "35102", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35102" }, { "name": "SSA:2009-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.448834" }, { "name": "35746", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35746" }, { "name": "39428", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/39428" }, { "name": "1020755", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020755.1-1" }, { "name": "35094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35094" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "DSA-1807", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1807" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091" }, { "name": "oval:org.mitre.oval:def:6136", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6136" }, { "name": "35097", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35097" }, { "name": "ADV-2009-1313", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1313" }, { "name": "ADV-2009-2012", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2012" }, { "name": "oval:org.mitre.oval:def:10687", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10687" }, { "name": "SUSE-SR:2009:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" }, { "name": "1021699", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1" }, { "name": "GLSA-200907-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200907-09.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm" }, { "name": "264248", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264248-1" }, { "name": "35206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35206" }, { "name": "259148", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259148-1" }, { "name": "MDVSA-2009:113", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:113" }, { "name": "RHSA-2009:1116", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1116.html" }, { "name": "34961", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34961" }, { "name": "35416", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35416" }, { "name": "273910", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1" }, { "name": "54514", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/54514" }, { "name": "USN-790-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-790-1" }, { "name": "1022231", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022231" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz" }, { "name": "solaris-sasl-saslencode64-bo(50554)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50554" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "54515", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/54515" }, { "name": "35239", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35239" }, { "name": "TA10-103B", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html" }, { "name": "35321", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35321" }, { "name": "VU#238019", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/238019" }, { "name": "35497", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35497" }, { "name": "35102", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35102" }, { "name": "SSA:2009-134-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.448834" }, { "name": "35746", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35746" }, { "name": "39428", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/39428" }, { "name": "1020755", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020755.1-1" }, { "name": "35094", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35094" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "DSA-1807", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1807" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091" }, { "name": "oval:org.mitre.oval:def:6136", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6136" }, { "name": "35097", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35097" }, { "name": "ADV-2009-1313", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1313" }, { "name": "ADV-2009-2012", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2012" }, { "name": "oval:org.mitre.oval:def:10687", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10687" }, { "name": "SUSE-SR:2009:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" }, { "name": "1021699", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1" }, { "name": "GLSA-200907-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200907-09.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm" }, { "name": "264248", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264248-1" }, { "name": "35206", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35206" }, { "name": "259148", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259148-1" }, { "name": "MDVSA-2009:113", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:113" }, { "name": "RHSA-2009:1116", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1116.html" }, { "name": "34961", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34961" }, { "name": "35416", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35416" }, { "name": "273910", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1" }, { "name": "54514", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/54514" }, { "name": "USN-790-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-790-1" }, { "name": "1022231", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022231" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz" }, { "name": "solaris-sasl-saslencode64-bo(50554)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50554" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2009-0688", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54515", "refsource": "OSVDB", "url": "http://osvdb.org/54515" }, { "name": "35239", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35239" }, { "name": "TA10-103B", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-103B.html" }, { "name": "35321", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35321" }, { "name": "VU#238019", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/238019" }, { "name": "35497", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35497" }, { "name": "35102", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35102" }, { "name": "SSA:2009-134-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.448834" }, { "name": "35746", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35746" }, { "name": "39428", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/39428" }, { "name": "1020755", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020755.1-1" }, { "name": "35094", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35094" }, { "name": "APPLE-SA-2010-03-29-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "DSA-1807", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1807" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091" }, { "name": "oval:org.mitre.oval:def:6136", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6136" }, { "name": "35097", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35097" }, { "name": "ADV-2009-1313", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1313" }, { "name": "ADV-2009-2012", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2012" }, { "name": "oval:org.mitre.oval:def:10687", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10687" }, { "name": "SUSE-SR:2009:011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" }, { "name": "1021699", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1" }, { "name": "GLSA-200907-09", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200907-09.xml" }, { "name": "http://support.apple.com/kb/HT4077", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4077" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm" }, { "name": "264248", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-264248-1" }, { "name": "35206", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35206" }, { "name": "259148", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259148-1" }, { "name": "MDVSA-2009:113", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:113" }, { "name": "RHSA-2009:1116", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1116.html" }, { "name": "34961", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34961" }, { "name": "35416", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35416" }, { "name": "273910", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1" }, { "name": "54514", "refsource": "OSVDB", "url": "http://osvdb.org/54514" }, { "name": "USN-790-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-790-1" }, { "name": "1022231", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022231" }, { "name": "ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz", "refsource": "CONFIRM", "url": "ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz" }, { "name": "solaris-sasl-saslencode64-bo(50554)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50554" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2009-0688", "datePublished": "2009-05-15T15:00:00", "dateReserved": "2009-02-22T00:00:00", "dateUpdated": "2024-08-07T04:40:05.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.