Lucene search

K
gentooGentoo FoundationGLSA-200502-29
HistoryFeb 23, 2005 - 12:00 a.m.

Cyrus IMAP Server: Multiple overflow vulnerabilities

2005-02-2300:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

86.1%

Background

The Cyrus IMAP Server is an efficient, highly-scalable IMAP e-mail server.

Description

Possible single byte overflows have been found in the imapd annotate extension and mailbox handling code. Furthermore stack buffer overflows have been found in fetchnews, the backend and imapd.

Impact

An attacker, who could be an authenticated user or an admin of a peering news server, could exploit these vulnerabilities to execute arbitrary code with the rights of the user running the Cyrus IMAP Server.

Workaround

There is no known workaround at this time.

Resolution

All Cyrus IMAP Server users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.2.12"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/cyrus-imapd< 2.2.12UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

86.1%