Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2002:034: imap


Vulnerability Assessment Details

MDKSA-2002:034: imap

Vulnerability Assessment Summary
Check for the version of the imap package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2002:034 (imap).


A buffer overflow was discovered in the imap server that could permit a malicious
user to run code on the server with the uid and gid of the email owner by
constructing a malformed request that would trigger the buffer overflow.
However, the user must successfully authenticate to the imap service in order to
exploit it, which limits the scope of the vulnerability somewhat, unless you are
a free mail provider or run a mail service where users do not already have shell
access to the system.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2002:034
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DELL PRECISION T3600 SYSTEM MOTHERBOARD 08HPGT +XEON QC E5-1607 3.0GHZ CPU
$75.0
DELL PRECISION T3600 SYSTEM MOTHERBOARD 08HPGT +XEON QC E5-1607 3.0GHZ CPU pictureHP Pavilion 554E Fan W/ Heat Sink Avc From AM37-L SOCKET462 Motherboard
$5.95
HP Pavilion 554E Fan W/ Heat Sink Avc From AM37-L SOCKET462 Motherboard pictureHP Pavilion 6475Z Fan W/ Heat Sink From 5188-7535 Motherboard
$14.95
HP Pavilion 6475Z Fan W/ Heat Sink From 5188-7535 Motherboard picture


Discussions

No Discussions have been posted on this vulnerability.