Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2001:054: imap

Vulnerability Assessment Details

MDKSA-2001:054: imap

Vulnerability Assessment Summary
Check for the version of the imap package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2001:054 (imap).

Several buffer overflow vulnerabilities have been found in the UW-IMAP package
by the authors and independant groups. These vulnerabilities can be exploited
only once a user has authenticated which limits the extent of the vulnerability
to a remote shell with that user's permissions. On systems where the user
already has a shell, nothing new will be provided to that user, unless the user
has only local shell access. On systems where the email accounts do not provide
shell access, however, the problem is much greater.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

For Kingston 120GB SSD Now V300 2.5" SATA III SV300S37A/120G Solid State Drive
For Kingston 120GB SSD Now V300 2.5Hgst 1tb 5400RPM Solid State Drive
Hgst 1tb 5400RPM Solid State Drive pictureHGST 500GB Z7K500 7mm 2.5" HTS545050A7E681 7200RPM Security Drive
HGST 500GB Z7K500 7mm 2.5


No Discussions have been posted on this vulnerability.