Description
In GNU SASL before 2.2.3, DIGEST-MD5 has a NULL pointer dereference affecting both clients and servers, via a known token with no accompanying = character. This occurs in lib/digest-md5/getsubopt.c.
Published: 2026-05-24
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In versions of GNU SASL older than 2.2.3, the DIGEST-MD5 authentication routine performs a NULL pointer dereference when it receives a token that does not include the required '=' character. This flaw results in a crash of either the client or the server component, which can be exploited to disrupt service availability.

Affected Systems

The vulnerability affects the GNU SASL library (GNU:GNU SASL) in all versions prior to 2.2.3. Both client and server implementations that use the lib/digest-md5 module can be impacted.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, while the absence of an EPSS score and lack of listing in CISA KEV suggest current exploitation risk is moderate but not yet observed. A likely attack vector is a network‑based attacker sending a specially crafted DIGEST‑MD5 request lacking the '=' character to a server or client that processes SASL authentication. This can lead to a denial of service through a crash, as the flaw is a direct NULL pointer dereference.

Generated by OpenCVE AI on May 24, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GNU SASL to version 2.2.3 or later.
  • Temporarily disable DIGEST-MD5 authentication in services that use GNU SASL until the upgrade can be performed.
  • If an upgrade is not feasible, ensure that any input passed to the DIGEST-MD5 routine is validated to contain an '=' character before being processed.

Generated by OpenCVE AI on May 24, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 24 May 2026 04:45:00 +0000

Type Values Removed Values Added
Title NULL Pointer Dereference in DIGEST-MD5 Handling of GNU SASL 2.2.3 and Earlier

Sun, 24 May 2026 03:30:00 +0000

Type Values Removed Values Added
Description In GNU SASL before 2.2.3, DIGEST-MD5 has a NULL pointer dereference affecting both clients and servers, via a known token with no accompanying = character. This occurs in lib/digest-md5/getsubopt.c.
First Time appeared Gnu
Gnu gnu Sasl
Weaknesses CWE-476
CPEs cpe:2.3:a:gnu:gnu_sasl:*:*:*:*:*:*:*:*
Vendors & Products Gnu
Gnu gnu Sasl
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-24T02:33:58.822Z

Reserved: 2026-05-24T02:22:03.024Z

Link: CVE-2026-48829

cve-icon Vulnrichment

No data.

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-24T04:30:34Z

Weaknesses