FreeBSD : cyrus-imapd -- multiple buffer overflow vulnerabilities (b2d248ad-88f6-11d9-aa18-0001020eed82)

High Nessus Plugin ID 19086


The remote FreeBSD host is missing one or more security-related updates.


The Cyrus IMAP Server ChangeLog states :

- Fix possible single byte overflow in mailbox handling code.

- Fix possible single byte overflows in the imapd annotate extension.

- Fix stack-based buffer overflows in fetchnews (exploitable by peer news server), backend (exploitable by admin), and in imapd (exploitable by users though only on platforms where a filename may be larger than a mailbox name).

The 2.1.X series are reportedly only affected by the second issue.

These issues may lead to execution of arbitrary code with the permissions of the user running the Cyrus IMAP Server.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 19086

File Name: freebsd_pkg_b2d248ad88f611d9aa180001020eed82.nasl

Version: $Revision: 1.16 $

Type: local

Published: 2005/07/13

Modified: 2016/05/05

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cyrus-imapd, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/02/27

Vulnerability Publication Date: 2005/02/14

Reference Information

CVE: CVE-2005-0546

BID: 12636