FreeBSD : cyrus-imapd -- multiple buffer overflow vulnerabilities (b2d248ad-88f6-11d9-aa18-0001020eed82)

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The Cyrus IMAP Server ChangeLog states :

- Fix possible single byte overflow in mailbox handling code.

- Fix possible single byte overflows in the imapd annotate extension.

- Fix stack-based buffer overflows in fetchnews (exploitable by peer news
server), backend (exploitable by admin), and in imapd (exploitable by
users though only on platforms where a filename may be larger than a
mailbox name).

The 2.1.X series are reportedly only affected by the second issue.

These issues may lead to execution of arbitrary code with the
permissions of the user running the Cyrus IMAP Server.

See also :

http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
http://www.nessus.org/u?5d65c48d

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 19086 (freebsd_pkg_b2d248ad88f611d9aa180001020eed82.nasl)

Bugtraq ID: 12636

CVE ID: CVE-2005-0546

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now