This script is Copyright (C) 2005-2010 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch
The remote host is missing the patch for the advisory SUSE-SA:2005:009 (cyrus-imapd).
This update fixes one-byte buffer overruns in the cyrus-imapd IMAP
Several overruns were fixed in the IMAP annote extension as well as
in cached header handling which can be run by an authenticated user.
Additionally bounds checking in fetchnews was improved to avoid
exploitation by a peer news admin.
Please note that one-byte buffer overflows can not be exploited to
execute arbitrary commands by manipulating the saved registers on
the stack if the compiler used (gcc >= 3) aligns the stack space.
Nevertheless the code behavior may be manipulated by overwriting
local variables. The result is not known but ranges between a
denial-of-service condition and privilege escalation.
This update backports bugfixes from the upstream release of
cyrus-imapd 2.2.11 announced on:
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now