Rapid7 Vulnerability & Exploit Database

CESA-2005:408: cyrus-imapd security update

Back to Search

CESA-2005:408: cyrus-imapd security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
05/02/2005
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated cyrus-imapd packages that fix several buffer overflow security issues are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The cyrus-imapd package contains the core of the Cyrus IMAP server. Several buffer overflow bugs were found in cyrus-imapd. It is possible that an authenticated malicious user could cause the imap server to crash. Additionally, a peer news admin could potentially execute arbitrary code on the imap server when news is received using the fetchnews command. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0546 to this issue. Users of cyrus-imapd are advised to upgrade to these updated packages, which contain cyrus-imapd version 2.2.12 to correct these issues.

Solution(s)

  • centos-upgrade-cyrus-imapd
  • centos-upgrade-cyrus-imapd-devel
  • centos-upgrade-cyrus-imapd-murder
  • centos-upgrade-cyrus-imapd-nntp
  • centos-upgrade-cyrus-imapd-utils
  • centos-upgrade-perl-cyrus

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;