Mandriva Linux Security Advisory 2009-113 – Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c. The updated packages have been patched to prevent this.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/77615/MDVSA-2009-113.txt
Source: https://packetstormsecurity.com/files/77615/Mandriva-Linux-Security-Advisory-2009-113.html

