Vulnerability Details CVE-2013-4122
Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.024
EPSS Ranking 84.3%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2013-4122
-
cpe:2.3:a:cmu:cyrus-sasl:1.5.28
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.19
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.20
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.21
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.22
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.23
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.24
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.25
-
cpe:2.3:a:cmu:cyrus-sasl:2.1.26
-
-
-
-
cpe:2.3:a:gnu:glibc:2.2.1
-
cpe:2.3:a:gnu:glibc:2.2.2
-
cpe:2.3:a:gnu:glibc:2.2.3
-
cpe:2.3:a:gnu:glibc:2.2.4
-
cpe:2.3:a:gnu:glibc:2.2.5
-
-
cpe:2.3:a:gnu:glibc:2.3.1
-
cpe:2.3:a:gnu:glibc:2.3.10
-
cpe:2.3:a:gnu:glibc:2.3.2
-
cpe:2.3:a:gnu:glibc:2.3.3
-
cpe:2.3:a:gnu:glibc:2.3.4
-
cpe:2.3:a:gnu:glibc:2.3.5
-
cpe:2.3:a:gnu:glibc:2.3.6
-
-
-
cpe:2.3:a:gnu:glibc:2.5.1
-
-
cpe:2.3:a:gnu:glibc:2.6.1
-
-
-