Sunday, February 27, 2022

Red Hat: CVE-2022-24407: Important: cyrus-sasl security update (Multiple Advisories)

Description
In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.A flaw was found in the SQL plugin shipped with Cyrus SASL. Failure to properly escape the SQL input allows a remote attacker to execute arbitrary SQL commands. This issue can lead to the escalation of privileges.
Solution(s)
  • redhat-upgrade-cyrus-sasl
  • redhat-upgrade-cyrus-sasl-debuginfo
  • redhat-upgrade-cyrus-sasl-debugsource
  • redhat-upgrade-cyrus-sasl-devel
  • redhat-upgrade-cyrus-sasl-devel-debuginfo
  • redhat-upgrade-cyrus-sasl-gs2
  • redhat-upgrade-cyrus-sasl-gs2-debuginfo
  • redhat-upgrade-cyrus-sasl-gssapi
  • redhat-upgrade-cyrus-sasl-gssapi-debuginfo
  • redhat-upgrade-cyrus-sasl-ldap
  • redhat-upgrade-cyrus-sasl-ldap-debuginfo
  • redhat-upgrade-cyrus-sasl-lib
  • redhat-upgrade-cyrus-sasl-lib-debuginfo
  • redhat-upgrade-cyrus-sasl-md5
  • redhat-upgrade-cyrus-sasl-md5-debuginfo
  • redhat-upgrade-cyrus-sasl-ntlm
  • redhat-upgrade-cyrus-sasl-ntlm-debuginfo
  • redhat-upgrade-cyrus-sasl-plain
  • redhat-upgrade-cyrus-sasl-plain-debuginfo
  • redhat-upgrade-cyrus-sasl-scram
  • redhat-upgrade-cyrus-sasl-scram-debuginfo
  • redhat-upgrade-cyrus-sasl-sql
  • redhat-upgrade-cyrus-sasl-sql-debuginfo


  • References
  • CVE-2022-24407
  • RHSA-2022:0658
  • RHSA-2022:0666
  • RHSA-2022:0668




  •  

    Copyright © 2021 Vulnerability Database | Cyber Details™

    thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore