Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2005:009: cyrus-imapd Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the cyrus-imapd package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2005:009 (cyrus-imapd).
This update fixes one-byte buffer overruns in the cyrus-imapd IMAP
Several overruns were fixed in the IMAP annote extension as well as
in cached header handling which can be run by an authenticated user.
Additionally bounds checking in fetchnews was improved to avoid
exploitation by a peer news admin.
Please note that one-byte buffer overflows can not be exploited to
execute arbitrary commands by manipulating the saved registers on
the stack if the compiler used (gcc >= 3) aligns the stack space.
Nevertheless the code behavior may be manipulated by overwriting
local variables. The result is not known but ranges between a
denial-of-service condition and privilege escalation.
This update backports bugfixes from the upstream release of
cyrus-imapd 2.2.11 announced on:
Solution : http://www.suse.de/security/advisories/2005_09_cyrus_imapd.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.