Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA215] DSA-215-1 cyrus-imapd

Vulnerability Assessment Details

[DSA215] DSA-215-1 cyrus-imapd

Vulnerability Assessment Summary
DSA-215-1 cyrus-imapd

Detailed Explanation for this Vulnerability Assessment

Timo Sirainen discovered a buffer overflow in the Cyrus IMAP server,
which could be exploited by a remote attacker prior to logging in. A
malicious user could craft a request to run commands on the server under
the UID and GID of the cyrus server.
For the current stable distribution (woody) this problem has been
fixed in version 1.5.19-9.1.
For the old stable distribution (potato) this problem has been fixed
in version 1.5.19-2.2.
For the unstable distribution (sid) this problem has been
fixed in version 1.5.19-9.10. Current cyrus21-imapd packages are not
We recommend that you upgrade your cyrus-imapd package.

Solution :
Network Security Threat Level: High

Networks Security ID: 6298

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Dell Inspiron 15.6" 15-3000 OEM HDD SSD Hard Drive Caddy Tray +Screws GLP*
Dell Inspiron 15.62010 2011 Macbook Air 11" 13" MZ-CPA1280/0A1 128GB Samsung Solid State Drive
2010 2011 Macbook Air 11DELL STEC 200GB uSATA 1.8" 6G HPLG Solid State Drive M16CSD1-200UCV-D DPN YV9C8
DELL STEC 200GB uSATA 1.8DELL Smart Storage 200GB uSATA 1.8" HotPlug Solid State Drive SG9XCS1 DPN/FH0R6
DELL Smart Storage 200GB uSATA 1.8


No Discussions have been posted on this vulnerability.