Lucene search

K
gentooGentoo FoundationGLSA-200411-34
HistoryNov 25, 2004 - 12:00 a.m.

Cyrus IMAP Server: Multiple remote vulnerabilities

2004-11-2500:00:00
Gentoo Foundation
security.gentoo.org
13

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.107 Low

EPSS

Percentile

95.1%

Background

The Cyrus IMAP Server is an efficient, highly-scalable IMAP e-mail server.

Description

Multiple vulnerabilities have been discovered in the argument parsers of the ‘partial’ and ‘fetch’ commands of the Cyrus IMAP Server (CAN-2004-1012, CAN-2004-1013). There are also buffer overflows in the ‘imap magic plus’ code that are vulnerable to exploitation as well (CAN-2004-1011, CAN-2004-1015).

Impact

An attacker can exploit these vulnerabilities to execute arbitrary code with the rights of the user running the Cyrus IMAP Server.

Workaround

There is no known workaround at this time.

Resolution

All Cyrus-IMAP Server users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.2.10"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-mail/cyrus-imapd< 2.2.10UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.107 Low

EPSS

Percentile

95.1%