The cyrus imapd contains a buffer overflow which could be exploited by remote attackers prior to logging in. Attackers could generate oversized error messages and overflow buffers inside imapd. Additionally to this fix, an overflow in the SASL library (as used by the cyrus imapd) has been fixed. This bug only affects SUSE Linux 8.1, the SUSE Linux Enterprise Server 8 and the SUSE Linux Openexchange Server.
Since there is no workaround possible except shutting down the IMAP server, we strongly recommend an update.
Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command "rpm -Fhv file.rpm" to apply the update. Our maintenance customers are being notified individually. The packages are being offered to install from the maintenance web.
To be sure the update takes effect you have to restart the IMAP server by executing the following commands as root:
/etc/rc.d/cyrus restart
and (if using saslauthd)
/etc/rc.d/saslauthd restart
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center