When sending invalid base64 SASL data, login process is...
Moderate severity
Unreviewed
Published
Mar 27, 2026
to the GitHub Advisory Database
•
Updated Mar 27, 2026
Description
Published by the National Vulnerability Database
Mar 27, 2026
Published to the GitHub Advisory Database
Mar 27, 2026
Last updated
Mar 27, 2026
When sending invalid base64 SASL data, login process is disconnected from the auth server, causing all active authentication sessions to fail. Invalid BASE64 data can be used to DoS a vulnerable server to break concurrent logins. Install fixed version or disable concurrency in login processes (heavy perfomance penalty on large deployments). No publicly available exploits are known.
References