{"id":"CVE-2019-19906","details":"cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.","modified":"2026-05-08T12:22:49.445565Z","published":"2019-12-19T18:15:12.833Z","related":["ALSA-2020:4497","SUSE-SU-2020:14579-1","SUSE-SU-2020:3939-1","SUSE-SU-2022:3549-1","openSUSE-SU-2024:10709-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"last_affected":"2.0.0"}],"cpe":"cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"13.6"}],"cpe":"cpe:2.3:o:apple:ipados:13.6:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"13.6"}],"cpe":"cpe:2.3:o:apple:iphone_os:13.6:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"fixed":"10.13.6"},{"introduced":"10.13.0"},{"fixed":"10.13.6"},{"introduced":"10.15.0"},{"fixed":"10.15.6"}],"cpe":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-NA"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2018\\-002"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2018\\-003"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-001"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-002"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-003"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-004"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-005"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-006"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2019\\-007"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2020\\-001"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2020\\-002"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.13.6-security_update_2020\\-003"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-NA"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2019\\-001"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2019\\-002"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2019\\-004"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2019\\-005"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2019\\-006"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2019\\-007"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2020\\-001"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2020\\-002"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.14.6-security_update_2020\\-003"}],"cpe":"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"12.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"14.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"19.10"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"10.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"9.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"31"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"32"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"5.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"6.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"8.4"}],"cpe":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/Jul/23"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2020/Jul/24"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Dec/42"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT211288"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT211289"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4591"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2022/02/23/4"},{"type":"FIX","url":"https://github.com/cyrusimap/cyrus-sasl/issues/587"},{"type":"FIX","url":"https://usn.ubuntu.com/4256-1/"},{"type":"EVIDENCE","url":"https://www.openldap.org/its/index.cgi/Incoming?id=9123"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/bookkeeper","events":[{"introduced":"0"},{"last_affected":"4d8a5efe57d847ab2adb59ad026ddca076c60ca1"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"4.12.1"}],"cpe":"cpe:2.3:a:apache:bookkeeper:4.12.1:*:*:*:*:*:*:*"}}],"versions":["release-4.12.0","release-4.12.1","release-4.12.1-docker"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19906.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/cyrusimap/cyrus-sasl","events":[{"introduced":"0"},{"fixed":"7a6b45b177070198fed0682bea5fa87c18abb084"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"fixed":"2.1.28"}],"cpe":"cpe:2.3:a:cyrusimap:cyrus-sasl:*:*:*:*:*:*:*:*"}}],"versions":["cyrus-sasl-2.1.23","cyrus-sasl-2.1.24","cyrus-sasl-2.1.25","cyrus-sasl-2.1.26","cyrus-sasl-2.1.27"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19906.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}