Total vulnerabilities in the database
cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
Software | From | Fixed in |
---|---|---|
cyrusimap / cyrus-sasl | - | 2.1.28 |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 19.10 | 19.10.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
fedoraproject / fedora | 31 | 31.x |
fedoraproject / fedora | 32 | 32.x |
redhat / enterprise_linux | 7.0 | 7.0.x |
redhat / enterprise_linux | 6.0 | 6.0.x |
redhat / jboss_enterprise_web_server | 2.0.0 | 2.0.0.x |
redhat / enterprise_linux | 5.0 | 5.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
apple / mac_os_x | 10.14.6 | 10.14.6.x |
redhat / enterprise_linux_server_tus | 8.4 | 8.4.x |
redhat / enterprise_linux_eus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_aus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_update_services_for_sap_solutions | 8.4 | 8.4.x |
redhat / enterprise_linux_for_power_little_endian | 8.0 | 8.0.x |
redhat / enterprise_linux_for_ibm_z_systems_eus | 8.4 | 8.4.x |
redhat / enterprise_linux_for_ibm_z_systems | 8.0 | 8.0.x |
redhat / enterprise_linux_for_power_little_endian_eus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.4 | 8.4.x |
apple / mac_os_x | - | 10.13.6 |
apple / mac_os_x | 10.13.0 | 10.13.6 |
apple / mac_os_x | 10.14.6-security_update_2020-001 | 10.14.6-security_update_2020-001.x |
apple / mac_os_x | 10.14.6-security_update_2020-002 | 10.14.6-security_update_2020-002.x |
apple / mac_os_x | 10.14.6-security_update_2020-003 | 10.14.6-security_update_2020-003.x |
apple / mac_os_x | 10.14.6-security_update_2019-007 | 10.14.6-security_update_2019-007.x |
apple / mac_os_x | 10.14.6-security_update_2019-004 | 10.14.6-security_update_2019-004.x |
apple / mac_os_x | 10.14.6-security_update_2019-005 | 10.14.6-security_update_2019-005.x |
apple / mac_os_x | 10.14.6-security_update_2019-006 | 10.14.6-security_update_2019-006.x |
apple / mac_os_x | 10.13.6-security_update_2020-001 | 10.13.6-security_update_2020-001.x |
apple / mac_os_x | 10.13.6-security_update_2020-002 | 10.13.6-security_update_2020-002.x |
apple / mac_os_x | 10.13.6-security_update_2020-003 | 10.13.6-security_update_2020-003.x |
apple / mac_os_x | 10.13.6-security_update_2018-003 | 10.13.6-security_update_2018-003.x |
apple / mac_os_x | 10.13.6-security_update_2018-002 | 10.13.6-security_update_2018-002.x |
apple / mac_os_x | 10.13.6-security_update_2019-003 | 10.13.6-security_update_2019-003.x |
apple / mac_os_x | 10.13.6-security_update_2019-002 | 10.13.6-security_update_2019-002.x |
apple / mac_os_x | 10.13.6-security_update_2019-001 | 10.13.6-security_update_2019-001.x |
apple / mac_os_x | 10.13.6-security_update_2019-007 | 10.13.6-security_update_2019-007.x |
apple / mac_os_x | 10.13.6-security_update_2019-006 | 10.13.6-security_update_2019-006.x |
apple / mac_os_x | 10.13.6-security_update_2019-005 | 10.13.6-security_update_2019-005.x |
apple / mac_os_x | 10.13.6-security_update_2019-004 | 10.13.6-security_update_2019-004.x |
apple / mac_os_x | 10.13.6 | 10.13.6.x |
apple / mac_os_x | 10.14.6-security_update_2019-001 | 10.14.6-security_update_2019-001.x |
apple / mac_os_x | 10.14.6-security_update_2019-002 | 10.14.6-security_update_2019-002.x |
apple / iphone_os | 13.6 | 13.6.x |
apple / ipados | 13.6 | 13.6.x |
apple / mac_os_x | 10.15.0 | 10.15.6 |
apache / bookkeeper | 4.12.1 | 4.12.1.x |