SUSE-SA:2005:009: cyrus-imapd

This script is Copyright (C) 2005-2010 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch

Description :

The remote host is missing the patch for the advisory SUSE-SA:2005:009 (cyrus-imapd).


This update fixes one-byte buffer overruns in the cyrus-imapd IMAP
server package.

Several overruns were fixed in the IMAP annote extension as well as
in cached header handling which can be run by an authenticated user.

Additionally bounds checking in fetchnews was improved to avoid
exploitation by a peer news admin.

Please note that one-byte buffer overflows can not be exploited to
execute arbitrary commands by manipulating the saved registers on
the stack if the compiler used (gcc >= 3) aligns the stack space.

Nevertheless the code behavior may be manipulated by overwriting
local variables. The result is not known but ranges between a
denial-of-service condition and privilege escalation.

This update backports bugfixes from the upstream release of
cyrus-imapd 2.2.11 announced on:

http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723

Solution :

http://www.suse.de/security/advisories/2005_09_cyrus_imapd.html

Risk factor :

High

Family: SuSE Local Security Checks

Nessus Plugin ID: 17217 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now