Package : cyrus-imapd-2.2
Vulnerability : NULL pointer dereference
Problem type : remote
Debian-specific: no
CVE IDs : CVE-2011-3481
It was discovered that cyrus-imapd, a highly scalable mail system designed
for use in enterprise environments, is not properly parsing mail headers
when a client makes use of the IMAP threading feature. As a result, a NULL
pointer is dereferenced which crashes the daemon. An attacker can trigger
this by sending a mail containing crafted reference headers and access the
mail with a client that uses the server threading feature of IMAP.
For the oldstable distribution (lenny), this problem has been fixed in
version 2.2.13-14+lenny6.
For the stable distribution (squeeze), this problem has been fixed in
version 2.2.13-19+squeeze3.
For the testing (wheezy) and unstable (sid) distributions, this problem has been
fixed in cyrus-imapd-2.4 version 2.4.11-1.
We recommend that you upgrade your cyrus-imapd-2.2 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
{"securityvulns": [{"lastseen": "2018-08-31T11:09:44", "bulletinFamily": "software", "cvelist": ["CVE-2011-3481"], "description": "Crash on parsing message References: header.", "edition": 1, "modified": "2011-10-26T00:00:00", "published": "2011-10-26T00:00:00", "id": "SECURITYVULNS:VULN:11997", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:11997", "title": "cyrus-imapd DoS", "type": "securityvulns", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "openvas": [{"lastseen": "2019-05-29T18:39:21", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-08-03T00:00:00", "type": "openvas", "title": "Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3481"], "modified": "2018-11-16T00:00:00", "id": "OPENVAS:1361412562310831590", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310831590", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:037\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.831590\");\n script_version(\"$Revision: 12381 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-16 12:16:30 +0100 (Fri, 16 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-03 09:51:07 +0530 (Fri, 03 Aug 2012)\");\n script_cve_id(\"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_xref(name:\"MDVSA\", value:\"2012:037\");\n script_name(\"Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'cyrus-imapd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\", re:\"ssh/login/release=MNDK_(2011\\.0|mes5\\.2|2010\\.1)\");\n script_tag(name:\"affected\", value:\"cyrus-imapd on Mandriva Linux 2011.0,\n Mandriva Enterprise Server 5.2,\n Mandriva Linux 2010.1\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"A vulnerability has been found and corrected in cyrus-imapd:\n\n The index_get_ids function in index.c in imapd in Cyrus IMAP Server\n before 2.4.11, when server-side threading is enabled, allows remote\n attackers to cause a denial of service (NULL pointer dereference and\n daemon crash) via a crafted References header in an e-mail message\n (CVE-2011-3481).\n\n The updated packages have been patched to correct this issue.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_mes5.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:39:11", "description": "The remote host is missing an update to cyrus-imapd-2.2\nannounced via advisory DSA 2377-1.", "cvss3": {}, "published": "2012-02-11T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3481"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:136141256231070696", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070696", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2377_1.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Description: Auto-generated from advisory DSA 2377-1 (cyrus-imapd-2.2)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70696\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2011-3481\");\n script_version(\"$Revision: 14275 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-11 03:25:02 -0500 (Sat, 11 Feb 2012)\");\n script_name(\"Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(5|6)\");\n script_xref(name:\"URL\", value:\"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202377-1\");\n script_tag(name:\"insight\", value:\"It was discovered that cyrus-imapd, a highly scalable mail system designed\nfor use in enterprise environments, is not properly parsing mail headers\nwhen a client makes use of the IMAP threading feature. As a result, a NULL\npointer is dereferenced which crashes the daemon. An attacker can trigger\nthis by sending a mail containing crafted reference headers and access the\nmail with a client that uses the server threading feature of IMAP.\n\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 2.2.13-14+lenny6.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 2.2.13-19+squeeze3.\n\nFor the testing (wheezy) and unstable (sid) distributions, this problem has been\nfixed in cyrus-imapd-2.4 version 2.4.11-1.\");\n\n script_tag(name:\"solution\", value:\"We recommend that you upgrade your cyrus-imapd-2.2 packages.\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update to cyrus-imapd-2.2\nannounced via advisory DSA 2377-1.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"cyrus-admin-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-clients-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-common-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-dev-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-doc-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-imapd-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-murder-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-nntpd-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-pop3d-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcyrus-imap-perl22\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-admin-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-clients-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-common-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-dev-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-doc-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-imapd-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-murder-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-nntpd-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-pop3d-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcyrus-imap-perl22\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2018-01-02T10:56:51", "description": "Check for the Version of cyrus-imapd", "cvss3": {}, "published": "2012-08-03T00:00:00", "type": "openvas", "title": "Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3481"], "modified": "2017-12-27T00:00:00", "id": "OPENVAS:831590", "href": "http://plugins.openvas.org/nasl.php?oid=831590", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A vulnerability has been found and corrected in cyrus-imapd:\n\n The index_get_ids function in index.c in imapd in Cyrus IMAP Server\n before 2.4.11, when server-side threading is enabled, allows remote\n attackers to cause a denial of service (NULL pointer dereference and\n daemon crash) via a crafted References header in an e-mail message\n (CVE-2011-3481).\n\n The updated packages have been patched to correct this issue.\";\n\ntag_affected = \"cyrus-imapd on Mandriva Linux 2011.0,\n Mandriva Enterprise Server 5.2,\n Mandriva Linux 2010.1\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://www.mandriva.com/en/support/security/advisories/?name=MDVSA-2012:037\");\n script_id(831590);\n script_version(\"$Revision: 8249 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-27 07:29:56 +0100 (Wed, 27 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-08-03 09:51:07 +0530 (Fri, 03 Aug 2012)\");\n script_cve_id(\"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_xref(name: \"MDVSA\", value: \"2012:037\");\n script_name(\"Mandriva Update for cyrus-imapd MDVSA-2012:037 (cyrus-imapd)\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of cyrus-imapd\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2011.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.3.16~7.2\", rls:\"MNDK_2011.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_mes5.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.3.12~0.p2.4.4mdvmes5.2\", rls:\"MNDK_mes5.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2010.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.3.15~10.4mdv2010.2\", rls:\"MNDK_2010.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:51:15", "description": "The remote host is missing an update to cyrus-imapd-2.2\nannounced via advisory DSA 2377-1.", "cvss3": {}, "published": "2012-02-11T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3481"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:70696", "href": "http://plugins.openvas.org/nasl.php?oid=70696", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_2377_1.nasl 6612 2017-07-07 12:08:03Z cfischer $\n# Description: Auto-generated from advisory DSA 2377-1 (cyrus-imapd-2.2)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"It was discovered that cyrus-imapd, a highly scalable mail system designed\nfor use in enterprise environments, is not properly parsing mail headers\nwhen a client makes use of the IMAP threading feature. As a result, a NULL\npointer is dereferenced which crashes the daemon. An attacker can trigger\nthis by sending a mail containing crafted reference headers and access the\nmail with a client that uses the server threading feature of IMAP.\n\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 2.2.13-14+lenny6.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 2.2.13-19+squeeze3.\n\nFor the testing (wheezy) and unstable (sid) distributions, this problem has been\nfixed in cyrus-imapd-2.4 version 2.4.11-1.\n\n\nWe recommend that you upgrade your cyrus-imapd-2.2 packages.\";\ntag_summary = \"The remote host is missing an update to cyrus-imapd-2.2\nannounced via advisory DSA 2377-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202377-1\";\n\nif(description)\n{\n script_id(70696);\n script_tag(name:\"cvss_base\", value:\"4.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_cve_id(\"CVE-2011-3481\");\n script_version(\"$Revision: 6612 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:08:03 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-11 03:25:02 -0500 (Sat, 11 Feb 2012)\");\n script_name(\"Debian Security Advisory DSA 2377-1 (cyrus-imapd-2.2)\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"cyrus-admin-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-clients-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-common-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-dev-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-doc-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-imapd-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-murder-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-nntpd-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-pop3d-2.2\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcyrus-imap-perl22\", ver:\"2.2.13-14+lenny6\", rls:\"DEB5.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-admin-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-clients-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-common-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-dev-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-doc-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-imapd-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-murder-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-nntpd-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"cyrus-pop3d-2.2\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcyrus-imap-perl22\", ver:\"2.2.13-19+squeeze3\", rls:\"DEB6.0\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 4.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2018-01-02T10:56:19", "description": "Check for the Version of cyrus-imapd", "cvss3": {}, "published": "2012-07-30T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2017-12-29T00:00:00", "id": "OPENVAS:881370", "href": "http://plugins.openvas.org/nasl.php?oid=881370", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n \n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n \n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n \n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\";\n\ntag_affected = \"cyrus-imapd on CentOS 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-December/018284.html\");\n script_id(881370);\n script_version(\"$Revision: 8257 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-29 07:29:46 +0100 (Fri, 29 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:37:00 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2011:1508\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of cyrus-imapd\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:55:36", "description": "Check for the Version of cyrus-imapd", "cvss3": {}, "published": "2011-12-02T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:881050", "href": "http://plugins.openvas.org/nasl.php?oid=881050", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"cyrus-imapd on CentOS 5\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-December/018282.html\");\n script_id(881050);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-02 13:30:01 +0530 (Fri, 02 Dec 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2011:1508\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386\");\n\n script_summary(\"Check for the Version of cyrus-imapd\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2020-03-17T23:04:13", "description": "The remote host is missing an update announced via the referenced Security Advisory.", "cvss3": {}, "published": "2015-09-08T00:00:00", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2011-27)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2020-03-13T00:00:00", "id": "OPENVAS:1361412562310120398", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120398", "sourceData": "# Copyright (C) 2015 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120398\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2015-09-08 11:24:40 +0200 (Tue, 08 Sep 2015)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2011-27)\");\n script_tag(name:\"insight\", value:\"An authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372 )A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially-crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481 )\");\n script_tag(name:\"solution\", value:\"Run yum update cyrus-imapd to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2011-27.html\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2015 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.16~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.16~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.16~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"cyrus-imapd-debuginfo\", rpm:\"cyrus-imapd-debuginfo~2.3.16~6.5.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:39", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-12-02T00:00:00", "type": "openvas", "title": "RedHat Update for cyrus-imapd RHSA-2011:1508-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2018-11-23T00:00:00", "id": "OPENVAS:1361412562310870520", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310870520", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for cyrus-imapd RHSA-2011:1508-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"https://www.redhat.com/archives/rhsa-announce/2011-December/msg00002.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.870520\");\n script_version(\"$Revision: 12497 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-11-23 09:28:21 +0100 (Fri, 23 Nov 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-02 13:28:57 +0530 (Fri, 02 Dec 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"RHSA\", value:\"2011:1508-01\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_name(\"RedHat Update for cyrus-imapd RHSA-2011:1508-01\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'cyrus-imapd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\", re:\"ssh/login/release=RHENT_(5|4)\");\n script_tag(name:\"affected\", value:\"cyrus-imapd on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_tag(name:\"insight\", value:\"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-debuginfo\", rpm:\"cyrus-imapd-debuginfo~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-debuginfo\", rpm:\"cyrus-imapd-debuginfo~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-25T10:55:32", "description": "Check for the Version of cyrus-imapd", "cvss3": {}, "published": "2011-12-02T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:881049", "href": "http://plugins.openvas.org/nasl.php?oid=881049", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"cyrus-imapd on CentOS 4\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-December/018283.html\");\n script_id(881049);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-02 13:29:56 +0530 (Fri, 02 Dec 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2011:1508\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386\");\n\n script_summary(\"Check for the Version of cyrus-imapd\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:36", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-07-30T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881425", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881425", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-December/018281.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881425\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:50:33 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"CESA\", value:\"2011:1508\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'cyrus-imapd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"cyrus-imapd on CentOS 5\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-12-02T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881049", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881049", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-December/018283.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881049\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-02 13:29:56 +0530 (Fri, 02 Dec 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"CESA\", value:\"2011:1508\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos4 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'cyrus-imapd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS4\");\n script_tag(name:\"affected\", value:\"cyrus-imapd on CentOS 4\");\n script_tag(name:\"insight\", value:\"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-27T10:55:12", "description": "Check for the Version of cyrus-imapd", "cvss3": {}, "published": "2011-12-02T00:00:00", "type": "openvas", "title": "RedHat Update for cyrus-imapd RHSA-2011:1508-01", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2017-07-12T00:00:00", "id": "OPENVAS:870520", "href": "http://plugins.openvas.org/nasl.php?oid=870520", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# RedHat Update for cyrus-imapd RHSA-2011:1508-01\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\";\n\ntag_affected = \"cyrus-imapd on Red Hat Enterprise Linux (v. 5 server),\n Red Hat Enterprise Linux AS version 4,\n Red Hat Enterprise Linux ES version 4,\n Red Hat Enterprise Linux WS version 4\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/rhsa-announce/2011-December/msg00002.html\");\n script_id(870520);\n script_version(\"$Revision: 6685 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:44:46 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-02 13:28:57 +0530 (Fri, 02 Dec 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"RHSA\", value: \"2011:1508-01\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_name(\"RedHat Update for cyrus-imapd RHSA-2011:1508-01\");\n\n script_summary(\"Check for the Version of cyrus-imapd\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"RHENT_5\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-debuginfo\", rpm:\"cyrus-imapd-debuginfo~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.el5_7.2\", rls:\"RHENT_5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"RHENT_4\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-debuginfo\", rpm:\"cyrus-imapd-debuginfo~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.2.12~17.el4\", rls:\"RHENT_4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-01-11T11:07:09", "description": "Check for the Version of cyrus-imapd", "cvss3": {}, "published": "2012-07-30T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2018-01-09T00:00:00", "id": "OPENVAS:881425", "href": "http://plugins.openvas.org/nasl.php?oid=881425", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n \n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n \n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n \n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\";\n\ntag_affected = \"cyrus-imapd on CentOS 5\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2011-December/018281.html\");\n script_id(881425);\n script_version(\"$Revision: 8336 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-01-09 08:01:48 +0100 (Tue, 09 Jan 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:50:33 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"CESA\", value: \"2011:1508\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos5 x86_64\");\n\n script_tag(name: \"summary\" , value: \"Check for the Version of cyrus-imapd\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:39:09", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2012-07-30T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881370", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881370", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2012 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-December/018284.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881370\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2012-07-30 17:37:00 +0530 (Mon, 30 Jul 2012)\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"CESA\", value:\"2011:1508\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos4 x86_64\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'cyrus-imapd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS4\");\n script_tag(name:\"affected\", value:\"cyrus-imapd on CentOS 4\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"insight\", value:\"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS4\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-murder\", rpm:\"cyrus-imapd-murder~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-nntp\", rpm:\"cyrus-imapd-nntp~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perl-Cyrus\", rpm:\"perl-Cyrus~2.2.12~17.el4\", rls:\"CentOS4\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:04", "description": "Oracle Linux Local Security Checks ELSA-2011-1508", "cvss3": {}, "published": "2015-10-06T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2011-1508", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122049", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122049", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2011-1508.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122049\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-06 14:12:12 +0300 (Tue, 06 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2011-1508\");\n script_tag(name:\"insight\", value:\"ELSA-2011-1508 - cyrus-imapd security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2011-1508\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2011-1508.html\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux(5|6)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.0.1.el5_7.2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.0.1.el5_7.2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.0.1.el5_7.2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.0.1.el5_7.2\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif(release == \"OracleLinux6\")\n{\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.16~6.el6_1.4\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.16~6.el6_1.4\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.16~6.el6_1.4\", rls:\"OracleLinux6\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:39:43", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2011-12-02T00:00:00", "type": "openvas", "title": "CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310881050", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310881050", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2011-December/018282.html\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.881050\");\n script_version(\"$Revision: 14222 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 13:50:48 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2011-12-02 13:30:01 +0530 (Fri, 02 Dec 2011)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name:\"CESA\", value:\"2011:1508\");\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_name(\"CentOS Update for cyrus-imapd CESA-2011:1508 centos5 i386\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'cyrus-imapd'\n package(s) announced via the referenced advisory.\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS5\");\n script_tag(name:\"affected\", value:\"cyrus-imapd on CentOS 5\");\n script_tag(name:\"insight\", value:\"The cyrus-imapd packages contain a high-performance mail server with IMAP,\n POP3, NNTP, and Sieve support.\n\n An authentication bypass flaw was found in the cyrus-imapd NNTP server,\n nntpd. A remote user able to use the nntpd service could use this flaw to\n read or post newsgroup messages on an NNTP server configured to require\n user authentication, without providing valid authentication credentials.\n (CVE-2011-3372)\n\n A NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\n imapd. A remote attacker could send a specially-crafted mail message to a\n victim that would possibly prevent them from accessing their mail normally,\n if they were using an IMAP client that relies on the server threading IMAP\n feature. (CVE-2011-3481)\n\n Red Hat would like to thank the Cyrus IMAP project for reporting the\n CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\n Research as the original reporter of CVE-2011-3372.\n\n Users of cyrus-imapd are advised to upgrade to these updated packages,\n which contain backported patches to correct these issues. After installing\n the update, cyrus-imapd will be restarted automatically.\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS5\")\n{\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd\", rpm:\"cyrus-imapd~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-devel\", rpm:\"cyrus-imapd-devel~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-perl\", rpm:\"cyrus-imapd-perl~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"cyrus-imapd-utils\", rpm:\"cyrus-imapd-utils~2.3.7~12.el5_7.2\", rls:\"CentOS5\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:51:13", "description": "The remote host is missing updates announced in\nadvisory GLSA 201110-16.", "cvss3": {}, "published": "2012-02-12T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201110-16 (Cyrus IMAP Server)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2632", "CVE-2011-3481", "CVE-2011-3208"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:70779", "href": "http://plugins.openvas.org/nasl.php?oid=70779", "sourceData": "#\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Cyrus IMAP Server is affected by multiple vulnerabilities which\n could potentially lead to the remote execution of arbitrary code or a\n Denial of Service.\";\ntag_solution = \"All Cyrus IMAP Server users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-mail/cyrus-imapd-2.4.12'\n \n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20201110-16\nhttp://bugs.gentoo.org/show_bug.cgi?id=283596\nhttp://bugs.gentoo.org/show_bug.cgi?id=382349\nhttp://bugs.gentoo.org/show_bug.cgi?id=385729\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 201110-16.\";\n\n \n \nif(description)\n{\n script_id(70779);\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-2632\", \"CVE-2011-3208\", \"CVE-2011-3481\");\n script_version(\"$Revision: 6593 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:18:14 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:40 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201110-16 (Cyrus IMAP Server)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"net-mail/cyrus-imapd\", unaffected: make_list(\"ge 2.4.12\"), vulnerable: make_list(\"lt 2.4.12\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:38:57", "description": "The remote host is missing updates announced in\nadvisory GLSA 201110-16.", "cvss3": {}, "published": "2012-02-12T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201110-16 (Cyrus IMAP Server)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2632", "CVE-2011-3481", "CVE-2011-3208"], "modified": "2018-10-12T00:00:00", "id": "OPENVAS:136141256231070779", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231070779", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa_201110_16.nasl 11859 2018-10-12 08:53:01Z cfischer $\n#\n# Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.70779\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cve_id(\"CVE-2009-2632\", \"CVE-2011-3208\", \"CVE-2011-3481\");\n script_version(\"$Revision: 11859 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 10:53:01 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2012-02-12 10:04:40 -0500 (Sun, 12 Feb 2012)\");\n script_name(\"Gentoo Security Advisory GLSA 201110-16 (Cyrus IMAP Server)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name:\"insight\", value:\"The Cyrus IMAP Server is affected by multiple vulnerabilities which\n could potentially lead to the remote execution of arbitrary code or a\n Denial of Service.\");\n script_tag(name:\"solution\", value:\"All Cyrus IMAP Server users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-mail/cyrus-imapd-2.4.12'\");\n\n script_xref(name:\"URL\", value:\"http://www.securityspace.com/smysecure/catid.html?in=GLSA%20201110-16\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=283596\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=382349\");\n script_xref(name:\"URL\", value:\"http://bugs.gentoo.org/show_bug.cgi?id=385729\");\n script_tag(name:\"summary\", value:\"The remote host is missing updates announced in\nadvisory GLSA 201110-16.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"pkg-lib-gentoo.inc\");\ninclude(\"revisions-lib.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = ispkgvuln(pkg:\"net-mail/cyrus-imapd\", unaffected: make_list(\"ge 2.4.12\"), vulnerable: make_list(\"lt 2.4.12\"))) != NULL ) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T12:27:41", "description": "The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.", "cvss3": {}, "published": "2011-09-14T17:17:00", "type": "cve", "title": "CVE-2011-3481", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-3481"], "modified": "2018-10-30T16:26:00", "cpe": ["cpe:/a:cmu:cyrus_imap_server:2.3.9", "cpe:/a:cmu:cyrus_imap_server:2.4.4", "cpe:/a:cmu:cyrus_imap_server:2.4.3", "cpe:/a:cmu:cyrus_imap_server:2.2.11", "cpe:/a:cmu:cyrus_imap_server:2.3.6", "cpe:/a:cmu:cyrus_imap_server:2.3.4", "cpe:/a:cmu:cyrus_imap_server:2.3.17", "cpe:/a:cmu:cyrus_imap_server:2.3.12", "cpe:/a:cmu:cyrus_imap_server:2.4.1", "cpe:/a:cmu:cyrus_imap_server:2.2.13", "cpe:/a:cmu:cyrus_imap_server:2.4.5", "cpe:/a:cmu:cyrus_imap_server:2.2.12", "cpe:/a:cmu:cyrus_imap_server:2.3.13", "cpe:/a:cmu:cyrus_imap_server:2.3.1", "cpe:/a:cmu:cyrus_imap_server:2.3.14", "cpe:/a:cmu:cyrus_imap_server:2.4.9", "cpe:/a:cmu:cyrus_imap_server:2.3.8", "cpe:/a:cmu:cyrus_imap_server:2.4.6", "cpe:/a:cmu:cyrus_imap_server:2.3.7", "cpe:/a:cmu:cyrus_imap_server:2.2.13p1", "cpe:/a:cmu:cyrus_imap_server:2.4.7", "cpe:/a:cmu:cyrus_imap_server:2.1.17", "cpe:/a:cmu:cyrus_imap_server:2.4.2", "cpe:/a:cmu:cyrus_imap_server:2.3.11", "cpe:/a:cmu:cyrus_imap_server:2.3.0", "cpe:/a:cmu:cyrus_imap_server:2.1.18", "cpe:/a:cmu:cyrus_imap_server:2.3.16", "cpe:/a:cmu:cyrus_imap_server:2.3.3", "cpe:/a:cmu:cyrus_imap_server:2.3.5", "cpe:/a:cmu:cyrus_imap_server:2.4.8", "cpe:/a:cmu:cyrus_imap_server:2.0.17", "cpe:/a:cmu:cyrus_imap_server:2.3.2", "cpe:/a:cmu:cyrus_imap_server:2.1.16", "cpe:/a:cmu:cyrus_imap_server:2.4.0", "cpe:/a:cmu:cyrus_imap_server:2.3.10", "cpe:/a:cmu:cyrus_imap_server:2.2.10", "cpe:/a:cmu:cyrus_imap_server:2.2.9", "cpe:/a:cmu:cyrus_imap_server:2.3.15", "cpe:/a:cmu:cyrus_imap_server:2.2.8", "cpe:/a:cmu:cyrus_imap_server:2.4.10"], "id": "CVE-2011-3481", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3481", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:a:cmu:cyrus_imap_server:2.2.13p1:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.17:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.1.18:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.1.17:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cmu:cyrus_imap_server:2.4.0:*:*:*:*:*:*:*"]}], "nessus": [{"lastseen": "2021-08-19T12:58:42", "description": "A vulnerability has been found and corrected in cyrus-imapd :\n\nThe index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message (CVE-2011-3481).\n\nThe updated packages have been patched to correct this issue.", "cvss3": {"score": null, "vector": null}, "published": "2012-03-26T00:00:00", "type": "nessus", "title": "Mandriva Linux Security Advisory : cyrus-imapd (MDVSA-2012:037)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3481"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:cyrus-imapd", "p-cpe:/a:mandriva:linux:cyrus-imapd-devel", "p-cpe:/a:mandriva:linux:cyrus-imapd-murder", "p-cpe:/a:mandriva:linux:cyrus-imapd-nntp", "p-cpe:/a:mandriva:linux:cyrus-imapd-utils", "p-cpe:/a:mandriva:linux:perl-Cyrus", "cpe:/o:mandriva:linux:2010.1", "cpe:/o:mandriva:linux:2011"], "id": "MANDRIVA_MDVSA-2012-037.NASL", "href": "https://www.tenable.com/plugins/nessus/58476", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2012:037. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(58476);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2011-3481\");\n script_bugtraq_id(49659);\n script_xref(name:\"MDVSA\", value:\"2012:037\");\n\n script_name(english:\"Mandriva Linux Security Advisory : cyrus-imapd (MDVSA-2012:037)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability has been found and corrected in cyrus-imapd :\n\nThe index_get_ids function in index.c in imapd in Cyrus IMAP Server\nbefore 2.4.11, when server-side threading is enabled, allows remote\nattackers to cause a denial of service (NULL pointer dereference and\ndaemon crash) via a crafted References header in an e-mail message\n(CVE-2011-3481).\n\nThe updated packages have been patched to correct this issue.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:cyrus-imapd-murder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:cyrus-imapd-nntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:cyrus-imapd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:perl-Cyrus\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2010.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2011\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/03/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2010.1\", reference:\"cyrus-imapd-2.3.15-10.4mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"cyrus-imapd-devel-2.3.15-10.4mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"cyrus-imapd-murder-2.3.15-10.4mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"cyrus-imapd-nntp-2.3.15-10.4mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"cyrus-imapd-utils-2.3.15-10.4mdv2010.2\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2010.1\", reference:\"perl-Cyrus-2.3.15-10.4mdv2010.2\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2011\", reference:\"cyrus-imapd-2.3.16-7.2-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"cyrus-imapd-devel-2.3.16-7.2-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"cyrus-imapd-murder-2.3.16-7.2-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"cyrus-imapd-nntp-2.3.16-7.2-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"cyrus-imapd-utils-2.3.16-7.2-mdv2011.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2011\", reference:\"perl-Cyrus-2.3.16-7.2-mdv2011.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:59:16", "description": "It was discovered that cyrus-imapd, a highly scalable mail system designed for use in enterprise environments, is not properly parsing mail headers when a client makes use of the IMAP threading feature. As a result, a NULL pointer is dereferenced which crashes the daemon. An attacker can trigger this by sending a mail containing crafted reference headers and access the mail with a client that uses the server threading feature of IMAP.", "cvss3": {"score": null, "vector": null}, "published": "2012-01-12T00:00:00", "type": "nessus", "title": "Debian DSA-2377-1 : cyrus-imapd-2.2 - NULL pointer dereference", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3481"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:cyrus-imapd-2.2", "cpe:/o:debian:debian_linux:5.0", "cpe:/o:debian:debian_linux:6.0"], "id": "DEBIAN_DSA-2377.NASL", "href": "https://www.tenable.com/plugins/nessus/57517", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-2377. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57517);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2011-3481\");\n script_bugtraq_id(49659);\n script_xref(name:\"DSA\", value:\"2377\");\n\n script_name(english:\"Debian DSA-2377-1 : cyrus-imapd-2.2 - NULL pointer dereference\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that cyrus-imapd, a highly scalable mail system\ndesigned for use in enterprise environments, is not properly parsing\nmail headers when a client makes use of the IMAP threading feature. As\na result, a NULL pointer is dereferenced which crashes the daemon. An\nattacker can trigger this by sending a mail containing crafted\nreference headers and access the mail with a client that uses the\nserver threading feature of IMAP.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/squeeze/cyrus-imapd-2.2\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2012/dsa-2377\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the cyrus-imapd-2.2 packages.\n\nFor the oldstable distribution (lenny), this problem has been fixed in\nversion 2.2.13-14+lenny6.\n\nFor the stable distribution (squeeze), this problem has been fixed in\nversion 2.2.13-19+squeeze3.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:cyrus-imapd-2.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:6.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2012/01/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/01/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"5.0\", prefix:\"cyrus-imapd-2.2\", reference:\"2.2.13-14+lenny6\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-admin-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-clients-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-common-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-dev-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-doc-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-imapd-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-murder-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-nntpd-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"cyrus-pop3d-2.2\", reference:\"2.2.13-19+squeeze3\")) flag++;\nif (deb_check(release:\"6.0\", prefix:\"libcyrus-imap-perl22\", reference:\"2.2.13-19+squeeze3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2021-08-19T12:49:34", "description": "An authentication bypass (CVE-2011-3372) and a DoS vulnerability (CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : cyrus-imapd (openSUSE-SU-2011:1170-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:cyrus-imapd", "p-cpe:/a:novell:opensuse:cyrus-imapd-debuginfo", "p-cpe:/a:novell:opensuse:cyrus-imapd-debugsource", "p-cpe:/a:novell:opensuse:cyrus-imapd-devel", "p-cpe:/a:novell:opensuse:perl-Cyrus-IMAP", "p-cpe:/a:novell:opensuse:perl-Cyrus-IMAP-debuginfo", "p-cpe:/a:novell:opensuse:perl-Cyrus-SIEVE-managesieve", "p-cpe:/a:novell:opensuse:perl-Cyrus-SIEVE-managesieve-debuginfo", "cpe:/o:novell:opensuse:11.4"], "id": "SUSE_11_4_CYRUS-IMAPD-111005.NASL", "href": "https://www.tenable.com/plugins/nessus/75811", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update cyrus-imapd-5240.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75811);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n\n script_name(english:\"openSUSE Security Update : cyrus-imapd (openSUSE-SU-2011:1170-1)\");\n script_summary(english:\"Check for the cyrus-imapd-5240 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An authentication bypass (CVE-2011-3372) and a DoS vulnerability\n(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=719998\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-10/msg00026.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected cyrus-imapd packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cyrus-imapd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cyrus-imapd-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-Cyrus-IMAP\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-Cyrus-IMAP-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-Cyrus-SIEVE-managesieve\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-Cyrus-SIEVE-managesieve-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.4\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.4)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.4\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.4\", reference:\"cyrus-imapd-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"cyrus-imapd-debuginfo-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"cyrus-imapd-debugsource-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"cyrus-imapd-devel-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"perl-Cyrus-IMAP-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"perl-Cyrus-IMAP-debuginfo-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"perl-Cyrus-SIEVE-managesieve-2.3.16-16.21.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.4\", reference:\"perl-Cyrus-SIEVE-managesieve-debuginfo-2.3.16-16.21.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cyrus-imapd / cyrus-imapd-devel / perl-Cyrus-IMAP / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:53:32", "description": "From Red Hat Security Advisory 2011:1508 :\n\nUpdated cyrus-imapd packages that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nThe cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia Research as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, cyrus-imapd will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 4 / 5 / 6 : cyrus-imapd (ELSA-2011-1508)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:cyrus-imapd", "p-cpe:/a:oracle:linux:cyrus-imapd-devel", "p-cpe:/a:oracle:linux:cyrus-imapd-murder", "p-cpe:/a:oracle:linux:cyrus-imapd-nntp", "p-cpe:/a:oracle:linux:cyrus-imapd-perl", "p-cpe:/a:oracle:linux:cyrus-imapd-utils", "p-cpe:/a:oracle:linux:perl-Cyrus", "cpe:/o:oracle:linux:4", "cpe:/o:oracle:linux:5", "cpe:/o:oracle:linux:6"], "id": "ORACLELINUX_ELSA-2011-1508.NASL", "href": "https://www.tenable.com/plugins/nessus/68397", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2011:1508 and \n# Oracle Linux Security Advisory ELSA-2011-1508 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(68397);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_bugtraq_id(49659, 49949);\n script_xref(name:\"RHSA\", value:\"2011:1508\");\n\n script_name(english:\"Oracle Linux 4 / 5 / 6 : cyrus-imapd (ELSA-2011-1508)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2011:1508 :\n\nUpdated cyrus-imapd packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe cyrus-imapd packages contain a high-performance mail server with\nIMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP\nserver, nntpd. A remote user able to use the nntpd service could use\nthis flaw to read or post newsgroup messages on an NNTP server\nconfigured to require user authentication, without providing valid\nauthentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP\nserver, imapd. A remote attacker could send a specially crafted mail\nmessage to a victim that would possibly prevent them from accessing\ntheir mail normally, if they were using an IMAP client that relies on\nthe server threading IMAP feature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the\nCVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\nResearch as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling the update, cyrus-imapd will be restarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-December/002490.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-December/002491.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2011-December/002492.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected cyrus-imapd packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cyrus-imapd-murder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cyrus-imapd-nntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cyrus-imapd-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cyrus-imapd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perl-Cyrus\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/09/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 4 / 5 / 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL4\", reference:\"cyrus-imapd-2.2.12-17.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"cyrus-imapd-devel-2.2.12-17.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"cyrus-imapd-murder-2.2.12-17.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"cyrus-imapd-nntp-2.2.12-17.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"cyrus-imapd-utils-2.2.12-17.0.1.el4\")) flag++;\nif (rpm_check(release:\"EL4\", reference:\"perl-Cyrus-2.2.12-17.0.1.el4\")) flag++;\n\nif (rpm_check(release:\"EL5\", reference:\"cyrus-imapd-2.3.7-12.0.1.el5_7.2\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"cyrus-imapd-devel-2.3.7-12.0.1.el5_7.2\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"cyrus-imapd-perl-2.3.7-12.0.1.el5_7.2\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"cyrus-imapd-utils-2.3.7-12.0.1.el5_7.2\")) flag++;\n\nif (rpm_check(release:\"EL6\", reference:\"cyrus-imapd-2.3.16-6.el6_1.4\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"cyrus-imapd-devel-2.3.16-6.el6_1.4\")) flag++;\nif (rpm_check(release:\"EL6\", reference:\"cyrus-imapd-utils-2.3.16-6.el6_1.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cyrus-imapd / cyrus-imapd-devel / cyrus-imapd-murder / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:57:40", "description": "The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481)\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, cyrus-imapd will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : cyrus-imapd on SL4.x, SL5.x, SL6.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20111201_CYRUS_IMAPD_ON_SL4_X.NASL", "href": "https://www.tenable.com/plugins/nessus/61182", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(61182);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n\n script_name(english:\"Scientific Linux Security Update : cyrus-imapd on SL4.x, SL5.x, SL6.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The cyrus-imapd packages contain a high-performance mail server with\nIMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP\nserver, nntpd. A remote user able to use the nntpd service could use\nthis flaw to read or post newsgroup messages on an NNTP server\nconfigured to require user authentication, without providing valid\nauthentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP\nserver, imapd. A remote attacker could send a specially crafted mail\nmessage to a victim that would possibly prevent them from accessing\ntheir mail normally, if they were using an IMAP client that relies on\nthe server threading IMAP feature. (CVE-2011-3481)\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling the update, cyrus-imapd will be restarted automatically.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1112&L=scientific-linux-errata&T=0&P=79\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?816d6cb4\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL4\", reference:\"cyrus-imapd-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"cyrus-imapd-debuginfo-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"cyrus-imapd-devel-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"cyrus-imapd-murder-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"cyrus-imapd-nntp-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"cyrus-imapd-utils-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"perl-Cyrus-2.2.12-17.el4\")) flag++;\n\nif (rpm_check(release:\"SL5\", reference:\"cyrus-imapd-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"cyrus-imapd-debuginfo-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"cyrus-imapd-devel-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"cyrus-imapd-perl-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"cyrus-imapd-utils-2.3.7-12.el5_7.2\")) flag++;\n\nif (rpm_check(release:\"SL6\", reference:\"cyrus-imapd-2.3.16-6.el6_1.4\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"cyrus-imapd-debuginfo-2.3.16-6.el6_1.4\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"cyrus-imapd-devel-2.3.16-6.el6_1.4\")) flag++;\nif (rpm_check(release:\"SL6\", reference:\"cyrus-imapd-utils-2.3.16-6.el6_1.4\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:59:23", "description": "Updated cyrus-imapd packages that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nThe cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia Research as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, cyrus-imapd will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2011-12-02T00:00:00", "type": "nessus", "title": "RHEL 4 / 5 / 6 : cyrus-imapd (RHSA-2011:1508)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:cyrus-imapd", "p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-debuginfo", "p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-devel", "p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-murder", "p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-nntp", "p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-perl", "p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-utils", "p-cpe:/a:redhat:enterprise_linux:perl-Cyrus", "cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:5", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:6.1"], "id": "REDHAT-RHSA-2011-1508.NASL", "href": "https://www.tenable.com/plugins/nessus/56991", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:1508. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56991);\n script_version(\"1.19\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_bugtraq_id(49659, 49949);\n script_xref(name:\"RHSA\", value:\"2011:1508\");\n\n script_name(english:\"RHEL 4 / 5 / 6 : cyrus-imapd (RHSA-2011:1508)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated cyrus-imapd packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe cyrus-imapd packages contain a high-performance mail server with\nIMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP\nserver, nntpd. A remote user able to use the nntpd service could use\nthis flaw to read or post newsgroup messages on an NNTP server\nconfigured to require user authentication, without providing valid\nauthentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP\nserver, imapd. A remote attacker could send a specially crafted mail\nmessage to a victim that would possibly prevent them from accessing\ntheir mail normally, if they were using an IMAP client that relies on\nthe server threading IMAP feature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the\nCVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\nResearch as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling the update, cyrus-imapd will be restarted automatically.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-3372\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2011-3481\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2011:1508\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-murder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-nntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cyrus-imapd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perl-Cyrus\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/09/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5|6)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 4.x / 5.x / 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2011:1508\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL4\", reference:\"cyrus-imapd-2.2.12-17.el4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"cyrus-imapd-devel-2.2.12-17.el4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"cyrus-imapd-murder-2.2.12-17.el4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"cyrus-imapd-nntp-2.2.12-17.el4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"cyrus-imapd-utils-2.2.12-17.el4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"perl-Cyrus-2.2.12-17.el4\")) flag++;\n\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"cyrus-imapd-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"cyrus-imapd-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"cyrus-imapd-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"cyrus-imapd-devel-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"cyrus-imapd-perl-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"cyrus-imapd-perl-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"cyrus-imapd-perl-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"cyrus-imapd-utils-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"cyrus-imapd-utils-2.3.7-12.el5_7.2\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"cyrus-imapd-utils-2.3.7-12.el5_7.2\")) flag++;\n\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"cyrus-imapd-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"cyrus-imapd-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"cyrus-imapd-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"cyrus-imapd-debuginfo-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", reference:\"cyrus-imapd-devel-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"cyrus-imapd-utils-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"s390x\", reference:\"cyrus-imapd-utils-2.3.16-6.el6_1.4\")) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"cyrus-imapd-utils-2.3.16-6.el6_1.4\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cyrus-imapd / cyrus-imapd-debuginfo / cyrus-imapd-devel / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:59:26", "description": "An authentication bypass (CVE-2011-3372) and a DoS vulnerability (CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.", "cvss3": {"score": null, "vector": null}, "published": "2011-12-13T00:00:00", "type": "nessus", "title": "SuSE 11.1 Security Update : cyrus-imapd (SAT Patch Number 5233)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:11:cyrus-imapd", "p-cpe:/a:novell:suse_linux:11:perl-Cyrus-IMAP", "p-cpe:/a:novell:suse_linux:11:perl-Cyrus-SIEVE-managesieve", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_11_CYRUS-IMAPD-111005.NASL", "href": "https://www.tenable.com/plugins/nessus/57096", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from SuSE 11 update information. The text itself is\n# copyright (C) Novell, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57096);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n\n script_name(english:\"SuSE 11.1 Security Update : cyrus-imapd (SAT Patch Number 5233)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 11 host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An authentication bypass (CVE-2011-3372) and a DoS vulnerability\n(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=718428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=719998\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-3372.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-3481.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply SAT patch number 5233.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:perl-Cyrus-IMAP\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:11:perl-Cyrus-SIEVE-managesieve\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)11\") audit(AUDIT_OS_NOT, \"SuSE 11\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SuSE 11\", cpu);\n\npl = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, \"SuSE 11.1\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"cyrus-imapd-2.3.11-60.65.64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"perl-Cyrus-IMAP-2.3.11-60.65.64.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:1, reference:\"perl-Cyrus-SIEVE-managesieve-2.3.11-60.65.64.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:50:08", "description": "An authentication bypass (CVE-2011-3372) and a DoS vulnerability (CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.", "cvss3": {"score": null, "vector": null}, "published": "2014-06-13T00:00:00", "type": "nessus", "title": "openSUSE Security Update : cyrus-imapd (openSUSE-SU-2011:1170-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:cyrus-imapd", "p-cpe:/a:novell:opensuse:cyrus-imapd-devel", "p-cpe:/a:novell:opensuse:perl-Cyrus-IMAP", "p-cpe:/a:novell:opensuse:perl-Cyrus-SIEVE-managesieve", "cpe:/o:novell:opensuse:11.3"], "id": "SUSE_11_3_CYRUS-IMAPD-111005.NASL", "href": "https://www.tenable.com/plugins/nessus/75459", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update cyrus-imapd-5240.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(75459);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n\n script_name(english:\"openSUSE Security Update : cyrus-imapd (openSUSE-SU-2011:1170-1)\");\n script_summary(english:\"Check for the cyrus-imapd-5240 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An authentication bypass (CVE-2011-3372) and a DoS vulnerability\n(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.novell.com/show_bug.cgi?id=719998\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.opensuse.org/opensuse-updates/2011-10/msg00026.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected cyrus-imapd packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-Cyrus-IMAP\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:perl-Cyrus-SIEVE-managesieve\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:11.3\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2014/06/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2014-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE11\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"11.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE11.3\", reference:\"cyrus-imapd-2.3.16-8.9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"cyrus-imapd-devel-2.3.16-8.9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"perl-Cyrus-IMAP-2.3.16-8.9.1\") ) flag++;\nif ( rpm_check(release:\"SUSE11.3\", reference:\"perl-Cyrus-SIEVE-managesieve-2.3.16-8.9.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cyrus-imapd / cyrus-imapd-devel / perl-Cyrus-IMAP / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:59:38", "description": "An authentication bypass (CVE-2011-3372) and a DoS vulnerability (CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.", "cvss3": {"score": null, "vector": null}, "published": "2011-10-24T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : cyrus-imapd (ZYPP Patch Number 7786)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-19T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_CYRUS-IMAPD-7786.NASL", "href": "https://www.tenable.com/plugins/nessus/56605", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56605);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n\n script_name(english:\"SuSE 10 Security Update : cyrus-imapd (ZYPP Patch Number 7786)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An authentication bypass (CVE-2011-3372) and a DoS vulnerability\n(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-3372.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-3481.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7786.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/10/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"cyrus-imapd-2.2.12-27.16.32.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"cyrus-imapd-devel-2.2.12-27.16.32.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"perl-Cyrus-IMAP-2.2.12-27.16.32.2\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:3, reference:\"perl-Cyrus-SIEVE-managesieve-2.2.12-27.16.32.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:59:30", "description": "Updated cyrus-imapd packages that fix two security issues are now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.\n\nThe cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the CVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia Research as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, cyrus-imapd will be restarted automatically.", "cvss3": {"score": null, "vector": null}, "published": "2011-12-02T00:00:00", "type": "nessus", "title": "CentOS 4 / 5 : cyrus-imapd (CESA-2011:1508)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:cyrus-imapd", "p-cpe:/a:centos:centos:cyrus-imapd-devel", "p-cpe:/a:centos:centos:cyrus-imapd-murder", "p-cpe:/a:centos:centos:cyrus-imapd-nntp", "p-cpe:/a:centos:centos:cyrus-imapd-perl", "p-cpe:/a:centos:centos:cyrus-imapd-utils", "p-cpe:/a:centos:centos:perl-Cyrus", "cpe:/o:centos:centos:4", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2011-1508.NASL", "href": "https://www.tenable.com/plugins/nessus/56985", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2011:1508 and \n# CentOS Errata and Security Advisory 2011:1508 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56985);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_bugtraq_id(49659, 49949);\n script_xref(name:\"RHSA\", value:\"2011:1508\");\n\n script_name(english:\"CentOS 4 / 5 : cyrus-imapd (CESA-2011:1508)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated cyrus-imapd packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having\nmoderate security impact. Common Vulnerability Scoring System (CVSS)\nbase scores, which give detailed severity ratings, are available for\neach vulnerability from the CVE links in the References section.\n\nThe cyrus-imapd packages contain a high-performance mail server with\nIMAP, POP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP\nserver, nntpd. A remote user able to use the nntpd service could use\nthis flaw to read or post newsgroup messages on an NNTP server\nconfigured to require user authentication, without providing valid\nauthentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP\nserver, imapd. A remote attacker could send a specially crafted mail\nmessage to a victim that would possibly prevent them from accessing\ntheir mail normally, if they were using an IMAP client that relies on\nthe server threading IMAP feature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the\nCVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\nResearch as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After\ninstalling the update, cyrus-imapd will be restarted automatically.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-December/018281.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1ec45129\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-December/018282.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dee0a792\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-December/018283.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1fb280c5\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2011-December/018284.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?68ac20bc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected cyrus-imapd packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:cyrus-imapd-murder\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:cyrus-imapd-nntp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:cyrus-imapd-perl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:cyrus-imapd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:perl-Cyrus\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/09/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 4.x / 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"cyrus-imapd-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"cyrus-imapd-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"cyrus-imapd-devel-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"cyrus-imapd-devel-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"cyrus-imapd-murder-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"cyrus-imapd-murder-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"cyrus-imapd-nntp-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"cyrus-imapd-nntp-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"cyrus-imapd-utils-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"cyrus-imapd-utils-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"i386\", reference:\"perl-Cyrus-2.2.12-17.el4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", cpu:\"x86_64\", reference:\"perl-Cyrus-2.2.12-17.el4\")) flag++;\n\nif (rpm_check(release:\"CentOS-5\", reference:\"cyrus-imapd-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"cyrus-imapd-devel-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"cyrus-imapd-perl-2.3.7-12.el5_7.2\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"cyrus-imapd-utils-2.3.7-12.el5_7.2\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cyrus-imapd / cyrus-imapd-devel / cyrus-imapd-murder / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:59:33", "description": "An authentication bypass (CVE-2011-3372) and a DoS vulnerability (CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.", "cvss3": {"score": null, "vector": null}, "published": "2011-12-13T00:00:00", "type": "nessus", "title": "SuSE 10 Security Update : cyrus-imapd (ZYPP Patch Number 7785)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2021-01-19T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE_CYRUS-IMAPD-7785.NASL", "href": "https://www.tenable.com/plugins/nessus/57176", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(57176);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n\n script_name(english:\"SuSE 10 Security Update : cyrus-imapd (ZYPP Patch Number 7785)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An authentication bypass (CVE-2011-3372) and a DoS vulnerability\n(CVE-2011-3481) have been fixed in the Cyrus IMAPd nntpd.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-3372.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2011-3481.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 7785.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"cyrus-imapd-2.2.12-27.30.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"cyrus-imapd-devel-2.2.12-27.30.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"perl-Cyrus-IMAP-2.2.12-27.30.1\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:4, reference:\"perl-Cyrus-SIEVE-managesieve-2.2.12-27.30.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:53:07", "description": "An authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481)", "cvss3": {"score": null, "vector": null}, "published": "2013-09-04T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : cyrus-imapd (ALAS-2011-27)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2018-04-18T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:cyrus-imapd", "p-cpe:/a:amazon:linux:cyrus-imapd-debuginfo", "p-cpe:/a:amazon:linux:cyrus-imapd-devel", "p-cpe:/a:amazon:linux:cyrus-imapd-utils", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2011-27.NASL", "href": "https://www.tenable.com/plugins/nessus/69586", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2011-27.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(69586);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/04/18 15:09:34\");\n\n script_cve_id(\"CVE-2011-3372\", \"CVE-2011-3481\");\n script_xref(name:\"ALAS\", value:\"2011-27\");\n script_xref(name:\"RHSA\", value:\"2011:1508\");\n\n script_name(english:\"Amazon Linux AMI : cyrus-imapd (ALAS-2011-27)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An authentication bypass flaw was found in the cyrus-imapd NNTP\nserver, nntpd. A remote user able to use the nntpd service could use\nthis flaw to read or post newsgroup messages on an NNTP server\nconfigured to require user authentication, without providing valid\nauthentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP\nserver, imapd. A remote attacker could send a specially crafted mail\nmessage to a victim that would possibly prevent them from accessing\ntheir mail normally, if they were using an IMAP client that relies on\nthe server threading IMAP feature. (CVE-2011-3481)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2011-27.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update cyrus-imapd' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:cyrus-imapd-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:cyrus-imapd-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:cyrus-imapd-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/12/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/09/04\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"cyrus-imapd-2.3.16-6.5.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"cyrus-imapd-debuginfo-2.3.16-6.5.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"cyrus-imapd-devel-2.3.16-6.5.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"cyrus-imapd-utils-2.3.16-6.5.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cyrus-imapd / cyrus-imapd-debuginfo / cyrus-imapd-devel / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:18:45", "description": "The remote host is affected by the vulnerability described in GLSA-201110-16 (Cyrus IMAP Server: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Cyrus IMAP Server.\n Please review the CVE identifiers referenced below for details.\n Impact :\n\n An unauthenticated local or remote attacker may be able to execute arbitrary code with the privileges of the Cyrus IMAP Server process or cause a Denial of Service.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2011-10-24T00:00:00", "type": "nessus", "title": "GLSA-201110-16 : Cyrus IMAP Server: Multiple vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2009-2632", "CVE-2011-3208", "CVE-2011-3481"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:cyrus-imapd", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-201110-16.NASL", "href": "https://www.tenable.com/plugins/nessus/56591", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201110-16.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(56591);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2009-2632\", \"CVE-2011-3208\", \"CVE-2011-3481\");\n script_bugtraq_id(36296, 36377, 49534, 49659);\n script_xref(name:\"GLSA\", value:\"201110-16\");\n\n script_name(english:\"GLSA-201110-16 : Cyrus IMAP Server: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201110-16\n(Cyrus IMAP Server: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Cyrus IMAP Server.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n An unauthenticated local or remote attacker may be able to execute\n arbitrary code with the privileges of the Cyrus IMAP Server process or\n cause a Denial of Service.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201110-16\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Cyrus IMAP Server users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-mail/cyrus-imapd-2.4.12'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:cyrus-imapd\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/10/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2011-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-mail/cyrus-imapd\", unaffected:make_list(\"ge 2.4.12\"), vulnerable:make_list(\"lt 2.4.12\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Cyrus IMAP Server\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntucve": [{"lastseen": "2021-11-22T21:56:21", "description": "The index_get_ids function in index.c in imapd in Cyrus IMAP Server before\n2.4.11, when server-side threading is enabled, allows remote attackers to\ncause a denial of service (NULL pointer dereference and daemon crash) via a\ncrafted References header in an e-mail message.", "cvss3": {}, "published": "2011-09-14T00:00:00", "type": "ubuntucve", "title": "CVE-2011-3481", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-3481"], "modified": "2011-09-14T00:00:00", "id": "UB:CVE-2011-3481", "href": "https://ubuntu.com/security/CVE-2011-3481", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:38:05", "description": "[2.3.16-6.4]\n- fix CVE-2011-3481: NULL pointer dereference via crafted \n References header in email (#738391)\n- fix CVE-2011-3372: nntpd authentication bypass (#740822)", "cvss3": {}, "published": "2011-12-01T00:00:00", "type": "oraclelinux", "title": "cyrus-imapd security update", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2011-12-01T00:00:00", "id": "ELSA-2011-1508", "href": "http://linux.oracle.com/errata/ELSA-2011-1508.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2021-10-21T04:43:38", "description": "The cyrus-imapd packages contain a high-performance mail server with IMAP,\nPOP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server,\nnntpd. A remote user able to use the nntpd service could use this flaw to\nread or post newsgroup messages on an NNTP server configured to require\nuser authentication, without providing valid authentication credentials.\n(CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\nimapd. A remote attacker could send a specially-crafted mail message to a\nvictim that would possibly prevent them from accessing their mail normally,\nif they were using an IMAP client that relies on the server threading IMAP\nfeature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the\nCVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\nResearch as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe update, cyrus-imapd will be restarted automatically.\n", "cvss3": {}, "published": "2011-12-01T00:00:00", "type": "redhat", "title": "(RHSA-2011:1508) Moderate: cyrus-imapd security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2018-06-06T16:24:06", "id": "RHSA-2011:1508", "href": "https://access.redhat.com/errata/RHSA-2011:1508", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "amazon": [{"lastseen": "2021-07-25T19:34:33", "description": "**Issue Overview:**\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server, nntpd. A remote user able to use the nntpd service could use this flaw to read or post newsgroup messages on an NNTP server configured to require user authentication, without providing valid authentication credentials. (CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server, imapd. A remote attacker could send a specially-crafted mail message to a victim that would possibly prevent them from accessing their mail normally, if they were using an IMAP client that relies on the server threading IMAP feature. (CVE-2011-3481)\n\n \n**Affected Packages:** \n\n\ncyrus-imapd\n\n \n**Issue Correction:** \nRun _yum update cyrus-imapd_ to update your system.\n\n \n\n\n**New Packages:**\n \n \n i686: \n \u00a0\u00a0\u00a0 cyrus-imapd-2.3.16-6.5.amzn1.i686 \n \u00a0\u00a0\u00a0 cyrus-imapd-devel-2.3.16-6.5.amzn1.i686 \n \u00a0\u00a0\u00a0 cyrus-imapd-utils-2.3.16-6.5.amzn1.i686 \n \u00a0\u00a0\u00a0 cyrus-imapd-debuginfo-2.3.16-6.5.amzn1.i686 \n \n src: \n \u00a0\u00a0\u00a0 cyrus-imapd-2.3.16-6.5.amzn1.src \n \n x86_64: \n \u00a0\u00a0\u00a0 cyrus-imapd-2.3.16-6.5.amzn1.x86_64 \n \u00a0\u00a0\u00a0 cyrus-imapd-utils-2.3.16-6.5.amzn1.x86_64 \n \u00a0\u00a0\u00a0 cyrus-imapd-devel-2.3.16-6.5.amzn1.x86_64 \n \u00a0\u00a0\u00a0 cyrus-imapd-debuginfo-2.3.16-6.5.amzn1.x86_64 \n \n \n", "edition": 2, "published": "2011-12-09T11:17:00", "type": "amazon", "title": "Medium: cyrus-imapd", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2014-09-14T15:06:00", "id": "ALAS-2011-027", "href": "https://alas.aws.amazon.com/ALAS-2011-27.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2022-02-27T11:55:58", "description": "**CentOS Errata and Security Advisory** CESA-2011:1508\n\n\nThe cyrus-imapd packages contain a high-performance mail server with IMAP,\nPOP3, NNTP, and Sieve support.\n\nAn authentication bypass flaw was found in the cyrus-imapd NNTP server,\nnntpd. A remote user able to use the nntpd service could use this flaw to\nread or post newsgroup messages on an NNTP server configured to require\nuser authentication, without providing valid authentication credentials.\n(CVE-2011-3372)\n\nA NULL pointer dereference flaw was found in the cyrus-imapd IMAP server,\nimapd. A remote attacker could send a specially-crafted mail message to a\nvictim that would possibly prevent them from accessing their mail normally,\nif they were using an IMAP client that relies on the server threading IMAP\nfeature. (CVE-2011-3481)\n\nRed Hat would like to thank the Cyrus IMAP project for reporting the\nCVE-2011-3372 issue. Upstream acknowledges Stefan Cornelius of Secunia\nResearch as the original reporter of CVE-2011-3372.\n\nUsers of cyrus-imapd are advised to upgrade to these updated packages,\nwhich contain backported patches to correct these issues. After installing\nthe update, cyrus-imapd will be restarted automatically.\n\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2011-December/055200.html\nhttps://lists.centos.org/pipermail/centos-announce/2011-December/055201.html\nhttps://lists.centos.org/pipermail/centos-announce/2011-December/055202.html\nhttps://lists.centos.org/pipermail/centos-announce/2011-December/055203.html\n\n**Affected packages:**\ncyrus-imapd\ncyrus-imapd-devel\ncyrus-imapd-murder\ncyrus-imapd-nntp\ncyrus-imapd-perl\ncyrus-imapd-utils\nperl-Cyrus\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2011:1508", "cvss3": {}, "published": "2011-12-01T17:48:28", "type": "centos", "title": "cyrus, perl security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2011-3372", "CVE-2011-3481"], "modified": "2011-12-01T17:53:09", "id": "CESA-2011:1508", "href": "https://lists.centos.org/pipermail/centos-announce/2011-December/055200.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2022-01-17T19:13:26", "description": "### Background\n\nThe Cyrus IMAP Server is an efficient, highly-scalable IMAP e-mail server. \n\n### Description\n\nMultiple vulnerabilities have been discovered in the Cyrus IMAP Server. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nAn unauthenticated local or remote attacker may be able to execute arbitrary code with the privileges of the Cyrus IMAP Server process or cause a Denial of Service. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Cyrus IMAP Server users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-mail/cyrus-imapd-2.4.12\"", "cvss3": {}, "published": "2011-10-22T00:00:00", "type": "gentoo", "title": "Cyrus IMAP Server: Multiple vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2009-2632", "CVE-2011-3208", "CVE-2011-3481"], "modified": "2011-10-22T00:00:00", "id": "GLSA-201110-16", "href": "https://security.gentoo.org/glsa/201110-16", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}