Aborting the process of SASL authentication can lead to a memory leak when the same login processes are reused. An attacker could use this flaw to cause a denial of service due to memory exhaustion.
This issue can be mitigated on vulnerable systems by limiting the login process to a single request per process, which is also the default value.