Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN37-1 : cyrus21-imapd vulnerability


Vulnerability Assessment Details

USN37-1 : cyrus21-imapd vulnerability

Vulnerability Assessment Summary
cyrus21-imapd vulnerability

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- cyrus21-admin
- cyrus21-clients
- cyrus21-common
- cyrus21-dev
- cyrus21-doc
- cyrus21-imapd
- cyrus21-murder
- cyrus21-pop3d
- libcyrus-imap-perl21


Description :

Recently another buffer overflow has been discovered in the SASL
authentication module of the Cyrus IMAP server. An off-by-one
comparison error in the mysasl_canon_user() function could lead to a
missing termination of an user name string.

This vulnerability could permit remote, attacker-supplied machine code
to be executed in the context of the affected server process. Since
the IMAP server usually runs as unprivileged user 'cyrus', there is no
possibility of root privilege escalation.

Solution :

Upgrade to :
- cyrus21-admin-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-clients-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-common-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-dev-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-doc-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-imapd-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-murder-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- cyrus21-pop3d-2.1.16-6ubuntu0.2 (Ubuntu 4.10)
- libcyrus-imap-perl21-2.1.16-6ubuntu0.2 (Ubuntu 4.10)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

HP SAS9212-4i 6Gb/s PCI-Express x8 SATA/SAS RAID Controller Card 636705-001 +Cbl
$74.96
HP SAS9212-4i 6Gb/s PCI-Express x8 SATA/SAS RAID Controller Card 636705-001 +Cbl pictureIBM pSeries 5703 Dual Channel Ultra320 SCSI RAID Controller PCI-X - 97P6516
$23.89
IBM pSeries 5703 Dual Channel Ultra320 SCSI RAID Controller PCI-X - 97P6516 pictureDell PowerEdge R330 E3-1220 v5 XEON 3.00GHz 4GB SAS RAID 1TB 1U Compact Server
$844.17
Dell PowerEdge R330 E3-1220 v5 XEON 3.00GHz 4GB SAS RAID 1TB 1U Compact Server pictureMicrosoft Windows Server 2016 Essentials Raid 1 Office Business -25 Users (G16)
$1249.0
Microsoft Windows Server 2016 Essentials Raid 1 Office Business -25 Users  (G16) picture


Discussions

No Discussions have been posted on this vulnerability.