FreeBSD : cyrus-imapd -- multiple buffer overflow vulnerabilities (b2d248ad-88f6-11d9-aa18-0001020eed82)

high Nessus Plugin ID 19086

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Cyrus IMAP Server ChangeLog states :

- Fix possible single byte overflow in mailbox handling code.

- Fix possible single byte overflows in the imapd annotate extension.

- Fix stack-based buffer overflows in fetchnews (exploitable by peer news server), backend (exploitable by admin), and in imapd (exploitable by users though only on platforms where a filename may be larger than a mailbox name).

The 2.1.X series are reportedly only affected by the second issue.

These issues may lead to execution of arbitrary code with the permissions of the user running the Cyrus IMAP Server.

Solution

Update the affected packages.

See Also

http://asg.web.cmu.edu/cyrus/download/imapd/changes.html

http://www.nessus.org/u?8358aa17

Plugin Details

Severity: High

ID: 19086

File Name: freebsd_pkg_b2d248ad88f611d9aa180001020eed82.nasl

Version: 1.19

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cyrus-imapd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 2/27/2005

Vulnerability Publication Date: 2/14/2005

Reference Information

CVE: CVE-2005-0546

BID: 12636