Update imap server daemons for IMAP and POP mail protocols to fix buffer overflow vulnerability (RHSA-2009:0275)
Reporter | Title | Published | Views | Family All 55 |
---|---|---|---|---|
![]() | UW-imapd tmail and dmail BOF Vulnerabilities (Linux) | 4 Dec 200800:00 | – | openvas |
![]() | RedHat Security Advisory RHSA-2009:0275 | 23 Feb 200900:00 | – | openvas |
![]() | Fedora Update for uw-imap FEDORA-2008-9383 | 17 Feb 200900:00 | – | openvas |
![]() | RedHat Security Advisory RHSA-2009:0275 | 23 Feb 200900:00 | – | openvas |
![]() | CentOS Update for imap CESA-2009:0275 centos3 i386 | 9 Aug 201100:00 | – | openvas |
![]() | Alpine tmail and dmail Buffer Overflow Vulnerabilities - Windows | 4 Dec 200800:00 | – | openvas |
![]() | Mandrake Security Advisory MDVSA-2009:064 (imap) | 7 Mar 200900:00 | – | openvas |
![]() | Fedora Update for uw-imap FEDORA-2008-9396 | 17 Feb 200900:00 | – | openvas |
![]() | CentOS Security Advisory CESA-2009:0275 (imap) | 23 Feb 200900:00 | – | openvas |
![]() | Fedora Update for uw-imap FEDORA-2008-9396 | 17 Feb 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | i386 | imap | 2002d-15 | imap-2002d-15.i386.rpm |
RedHat | any | ia64 | imap | 2002d-15 | imap-2002d-15.ia64.rpm |
RedHat | any | ppc | imap | 2002d-15 | imap-2002d-15.ppc.rpm |
RedHat | any | s390 | imap | 2002d-15 | imap-2002d-15.s390.rpm |
RedHat | any | s390x | imap | 2002d-15 | imap-2002d-15.s390x.rpm |
RedHat | any | x86_64 | imap | 2002d-15 | imap-2002d-15.x86_64.rpm |
RedHat | any | i386 | imap-debuginfo | 2002d-15 | imap-debuginfo-2002d-15.i386.rpm |
RedHat | any | ia64 | imap-debuginfo | 2002d-15 | imap-debuginfo-2002d-15.ia64.rpm |
RedHat | any | ppc | imap-debuginfo | 2002d-15 | imap-debuginfo-2002d-15.ppc.rpm |
RedHat | any | s390 | imap-debuginfo | 2002d-15 | imap-debuginfo-2002d-15.s390.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo