cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in sasladd_string in common.c in cyrus-sasl.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "2.0.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:ipados:13.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "13.6"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:iphone_os:13.6:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "13.6"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"fixed": "10.13.6"
},
{
"introduced": "10.13.0"
},
{
"fixed": "10.13.6"
},
{
"introduced": "10.15.0"
},
{
"fixed": "10.15.6"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-NA"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2018\\-002"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2018\\-003"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-001"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-002"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-003"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-004"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-005"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-006"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2019\\-007"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2020\\-001"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2020\\-002"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.13.6-security_update_2020\\-003"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-NA"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-001"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-002"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-004"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-005"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-006"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2019\\-007"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-001"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-002"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.14.6-security_update_2020\\-003"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"extracted_events": [
{
"last_affected": "12.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"extracted_events": [
{
"last_affected": "14.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"extracted_events": [
{
"last_affected": "16.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "19.10"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "10.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "9.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "31"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "32"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "5.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "6.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "7.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.4"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": "cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "4.12.1"
}
],
"source": "CPE_FIELD"
}{
"cpe": "cpe:2.3:a:cyrusimap:cyrus-sasl:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "2.1.28"
}
],
"source": "CPE_FIELD"
}