Oracle Linux 4 / 5 : cyrus-imapd (ELSA-2009-1116)

High Nessus Plugin ID 67877


The remote Oracle Linux host is missing one or more security updates.


From Red Hat Security Advisory 2009:1116 :

Updated cyrus-imapd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.

It was discovered that the Cyrus SASL library (cyrus-sasl) does not always reliably terminate output from the sasl_encode64() function used by programs using this library. The Cyrus IMAP server (cyrus-imapd) relied on this function's output being properly terminated. Under certain conditions, improperly terminated output from sasl_encode64() could, potentially, cause cyrus-imapd to crash, disclose portions of its memory, or lead to SASL authentication failures. (CVE-2009-0688)

Users of cyrus-imapd are advised to upgrade to these updated packages, which resolve this issue. After installing the update, cyrus-imapd will be restarted automatically.


Update the affected cyrus-imapd packages.

See Also

Plugin Details

Severity: High

ID: 67877

File Name: oraclelinux_ELSA-2009-1116.nasl

Version: Revision: 1.3

Type: local

Agent: unix

Published: 2013/07/12

Updated: 2015/12/01

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:cyrus-imapd, p-cpe:/a:oracle:linux:cyrus-imapd-devel, p-cpe:/a:oracle:linux:cyrus-imapd-murder, p-cpe:/a:oracle:linux:cyrus-imapd-nntp, p-cpe:/a:oracle:linux:cyrus-imapd-perl, p-cpe:/a:oracle:linux:cyrus-imapd-utils, p-cpe:/a:oracle:linux:perl-Cyrus, cpe:/o:oracle:linux:4, cpe:/o:oracle:linux:5

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2009/06/18

Reference Information

CVE: CVE-2009-0688

RHSA: 2009:1116

CWE: 119