{"api_version":"1","generated_at":"2026-04-22T22:48:08+00:00","cve":"CVE-2002-1347","urls":{"html":"https://cve.report/CVE-2002-1347","api":"https://cve.report/api/cve/CVE-2002-1347.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2002-1347","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2002-1347"},"summary":{"title":"CVE-2002-1347","description":"Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.","state":"PUBLISHED","assigner":"mitre","published_at":"2002-12-18 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-131","n/a"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://marc.info/?l=bugtraq&m=103946297703402&w=2","name":"http://marc.info/?l=bugtraq&m=103946297703402&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Patch"],"title":"'Cyrus SASL library buffer overflows' - MARC","mime":"text/x-diff","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/advisories/4826","name":"http://www.securityfocus.com/advisories/4826","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"-1","archivestatus":"500"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10811","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10811","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10810","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10810","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2002/dsa-215","name":"http://www.debian.org/security/2002/dsa-215","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Debian -- Security Information -- DSA-215-1 cyrus-imapd","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10812","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10812","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2002-283.html","name":"http://www.redhat.com/support/errata/RHSA-2002-283.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/6347","name":"http://www.securityfocus.com/bid/6347","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cyrus SASL Library Username Heap Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securityfocus.com/bid/6348","name":"http://www.securityfocus.com/bid/6348","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cyrus SASL Library LDAP Heap Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securityfocus.com/bid/6349","name":"http://www.securityfocus.com/bid/6349","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Cyrus SASL Library Logging Memory Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html","name":"http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"],"title":"APPLE-SA-2005-03-21 Security Update 2005-003","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html","name":"http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Neohapsis Archives - SuSE Security Discussion - [suse-security] SuSE Security Announcement: cyrus-imapd (SuSE-SA:2002:048) - From krahmer_at_suse.de","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557","name":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2002-1347","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-1347","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2002","cve_id":"1347","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1347","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2002","cve_id":"1347","vulnerable":"1","versionEndIncluding":"2.1.9","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"cyrusimap","cpe5":"cyrus_sasl","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T03:19:28.611Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"cyrus-sasl-logwriter-bo(10812)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10812"},{"name":"SuSE-SA:2002:048","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html"},{"name":"000557","tags":["vendor-advisory","x_refsource_CONECTIVA","x_transferred"],"url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557"},{"name":"6349","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/6349"},{"name":"20021209 Cyrus SASL library buffer overflows","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=103946297703402&w=2"},{"name":"DSA-215","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2002/dsa-215"},{"name":"cyrus-sasl-saslauthd-bo(10811)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10811"},{"name":"6348","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/6348"},{"name":"APPLE-SA-2005-03-21","tags":["vendor-advisory","x_refsource_APPLE","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"},{"name":"6347","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/6347"},{"name":"200212-10","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.securityfocus.com/advisories/4826"},{"name":"cyrus-sasl-username-bo(10810)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10810"},{"name":"RHSA-2002:283","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2002-283.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2002-12-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-10T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"cyrus-sasl-logwriter-bo(10812)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10812"},{"name":"SuSE-SA:2002:048","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html"},{"name":"000557","tags":["vendor-advisory","x_refsource_CONECTIVA"],"url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557"},{"name":"6349","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/6349"},{"name":"20021209 Cyrus SASL library buffer overflows","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=103946297703402&w=2"},{"name":"DSA-215","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2002/dsa-215"},{"name":"cyrus-sasl-saslauthd-bo(10811)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10811"},{"name":"6348","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/6348"},{"name":"APPLE-SA-2005-03-21","tags":["vendor-advisory","x_refsource_APPLE"],"url":"http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"},{"name":"6347","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/6347"},{"name":"200212-10","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.securityfocus.com/advisories/4826"},{"name":"cyrus-sasl-username-bo(10810)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10810"},{"name":"RHSA-2002:283","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2002-283.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2002-1347","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"cyrus-sasl-logwriter-bo(10812)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10812"},{"name":"SuSE-SA:2002:048","refsource":"SUSE","url":"http://archives.neohapsis.com/archives/linux/suse/2002-q4/1275.html"},{"name":"000557","refsource":"CONECTIVA","url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000557"},{"name":"6349","refsource":"BID","url":"http://www.securityfocus.com/bid/6349"},{"name":"20021209 Cyrus SASL library buffer overflows","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=103946297703402&w=2"},{"name":"DSA-215","refsource":"DEBIAN","url":"http://www.debian.org/security/2002/dsa-215"},{"name":"cyrus-sasl-saslauthd-bo(10811)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10811"},{"name":"6348","refsource":"BID","url":"http://www.securityfocus.com/bid/6348"},{"name":"APPLE-SA-2005-03-21","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"},{"name":"6347","refsource":"BID","url":"http://www.securityfocus.com/bid/6347"},{"name":"200212-10","refsource":"GENTOO","url":"http://www.securityfocus.com/advisories/4826"},{"name":"cyrus-sasl-username-bo(10810)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10810"},{"name":"RHSA-2002:283","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2002-283.html"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2002-1347","datePublished":"2002-12-11T05:00:00.000Z","dateReserved":"2002-12-10T00:00:00.000Z","dateUpdated":"2024-08-08T03:19:28.611Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2002-12-18 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-131","n/a"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cyrusimap:cyrus_sasl:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1.9","matchCriteriaId":"5A309C1F-0137-4CCF-B438-1CE6719A547A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","versionEndExcluding":"10.3.8","matchCriteriaId":"9290FC8C-8362-4595-A859-044D5FE848D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*","versionEndExcluding":"10.3.8","matchCriteriaId":"AB201A37-9EA9-46B4-A799-4DCC5326E88D"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2002","CveId":"1347","Ordinal":"1","Title":"CVE-2002-1347","CVE":"CVE-2002-1347","Year":"2002"},"notes":[{"CveYear":"2002","CveId":"1347","Ordinal":"1","NoteData":"Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.","Type":"Description","Title":"CVE-2002-1347"},{"CveYear":"2002","CveId":"1347","Ordinal":"2","NoteData":"2002-12-11","Type":"Other","Title":"Published"},{"CveYear":"2002","CveId":"1347","Ordinal":"3","NoteData":"2017-07-10","Type":"Other","Title":"Modified"}]}}}