Gentoo Linux Security Advisory GLSA 200907-09 – A buffer overflow in Cyrus-SASL might allow for the execution of arbitrary code in applications or daemons that authenticate using SASL. James Ralston reported that in certain situations, Cyrus-SASL does not properly terminate strings which can result in buffer overflows when performing Base64 encoding. Versions less than 2.1.23 are affected.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/79120/glsa-200907-09.txt
Source: https://packetstormsecurity.com/files/79120/Gentoo-Linux-Security-Advisory-200907-9.html

