Executive Summary
Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string.
Why It Matters
CVE-2002-1347 is rated CRITICAL severity, requiring immediate attention from security teams.
CVSS Base Score: 9.8/10
Affected Technologies
Vendors: cyrusimap, apple
Products: cyrus_sasl, mac_os_x, mac_os_x_server
🛡️What Defenders Should Check
Use Vulnios to continuously monitor your exposure to CVE-2002-1347 and similar vulnerabilities.
References & Sources
AI Security Advisor
Powered by Gemini
Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.
Affected Products
Sources
Protect Your Organization
Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.
Get instant alerts on Telegram
Join our public channel for real-time critical CVE alerts.
Follow @vulnios