Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <51E0EEB4.6040409@redhat.com>
Date: Sat, 13 Jul 2013 00:07:48 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: mancha <mancha1@...h.com>, solar@...nwall.com
Subject: Re: CVE request: Cyrus-sasl NULL ptr. dereference

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/12/2013 09:47 AM, mancha wrote:
> On Fri, 12 Jul 2013 15:35:22 +0000 "Solar Designer" wrote:
>> Does this really crash the entire daemon process rather than just
>> one of its children (where a new one would be spawned for another
>> request)?
>> 
>> I think this needs to be clarified, and the answer will affect 
>> whether we have a security issue (CVE-worthy) or not.
>> 
>> Alexander
> 
> That is a good question. The short answer is there isn't a re-spawn
> of crashed processes. The longer answer is cyrus-sasl's saslauthd
> defaults to starting up 5 round-robin listening threads
> (configurable via -n switch).
> 
> Under a default scenario, authentication would continue to be 
> available until the 5th NULL ptr. dereference.
> 
> --mancha
> 

Please use CVE-2013-4122 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=EBY6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.