Rapid7 Vulnerability & Exploit Database

SUSE-SA:2002:048: cyrus-imapd

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

SUSE-SA:2002:048: cyrus-imapd

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
12/20/2002
Created
07/25/2018
Added
11/08/2005
Modified
11/18/2015

Description

The cyrus imapd contains a buffer overflow which could be exploited by remote attackers prior to logging in. Attackers could generate oversized error messages and overflow buffers inside imapd. Additionally to this fix, an overflow in the SASL library (as used by the cyrus imapd) has been fixed. This bug only affects SUSE Linux 8.1, the SUSE Linux Enterprise Server 8 and the SUSE Linux Openexchange Server.

Since there is no workaround possible except shutting down the IMAP server, we strongly recommend an update.

Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command "rpm -Fhv file.rpm" to apply the update. Our maintenance customers are being notified individually. The packages are being offered to install from the maintenance web.

To be sure the update takes effect you have to restart the IMAP server by executing the following commands as root:

/etc/rc.d/cyrus restart

and (if using saslauthd)

/etc/rc.d/saslauthd restart

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;