SUSE-SA:2005:009: cyrus-imapd

high Nessus Plugin ID 17217

Synopsis

The remote host is missing a vendor-supplied security patch

Description

The remote host is missing the patch for the advisory SUSE-SA:2005:009 (cyrus-imapd).


This update fixes one-byte buffer overruns in the cyrus-imapd IMAP server package.

Several overruns were fixed in the IMAP annote extension as well as in cached header handling which can be run by an authenticated user.

Additionally bounds checking in fetchnews was improved to avoid exploitation by a peer news admin.

Please note that one-byte buffer overflows can not be exploited to execute arbitrary commands by manipulating the saved registers on the stack if the compiler used (gcc >= 3) aligns the stack space.

Nevertheless the code behavior may be manipulated by overwriting local variables. The result is not known but ranges between a denial-of-service condition and privilege escalation.

This update backports bugfixes from the upstream release of cyrus-imapd 2.2.11 announced on:

http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723

Solution

http://www.suse.de/security/advisories/2005_09_cyrus_imapd.html

Plugin Details

Severity: High

ID: 17217

File Name: suse_SA_2005_009.nasl

Version: 1.8

Agent: unix

Published: 2/25/2005

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list