Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Cyrus IMAP pre-login buffer overrun


Vulnerability Assessment Details

Cyrus IMAP pre-login buffer overrun

Vulnerability Assessment Summary
Checks for a pre-login buffer overrun in Cyrus IMAPd

Detailed Explanation for this Vulnerability Assessment

According to its banner, the remote Cyrus IMAP
server is vulnerable to a pre-login buffer overrun.

A possible hacker without a valid login could exploit this, and would be
able to execute arbitrary commands as the owner of the Cyrus
process. This would permit full access to all users' mailboxes.

More information : http://online.securityfocus.com/archive/1/301864

Solution : If possible, upgrade to an unaffected version. However, at
the time of writing no official fix was available. There is a source
patch against 2.1.10 in the Bugtraq report.

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Paul Johnston, Westpoint Ltd

Cables, Connectors

CPQ SYSTEM I/O BOARD BL20P BLADE SERVER - 237505-001
$33.96
CPQ SYSTEM I/O BOARD BL20P BLADE SERVER - 237505-001 pictureCISCO UCS-B200-M5 BLADE USC BAREBONES SERVER SMARTNET ELIGIBLE
$1399.99
CISCO UCS-B200-M5 BLADE USC BAREBONES SERVER SMARTNET ELIGIBLE pictureCISCO UCS B200 M5 BAREBONES BLADE SERVER
$1399.99
CISCO UCS B200 M5 BAREBONES BLADE SERVER pictureHP BL490c G7 12-Core Blade Server 2×Xeon X5650 6C Six-Core 2.66GHz 96GB RAM A3
$149.0
HP BL490c G7 12-Core Blade Server 2×Xeon X5650 6C Six-Core 2.66GHz 96GB RAM A3 picture


Discussions

No Discussions have been posted on this vulnerability.