Rapid7 Vulnerability & Exploit Database

SUSE-SA:2005:009: cyrus-imapd buffer overflows

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

SUSE-SA:2005:009: cyrus-imapd buffer overflows

Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
02/24/2005
Created
07/25/2018
Added
11/08/2005
Modified
11/18/2015

Description

This update fixes one-byte buffer overruns in the cyrus-imapd IMAP server package.

Several overruns were fixed in the IMAP annote extension as well as in cached header handling which can be run by an authenticated user.

Additionally bounds checking in fetchnews was improved to avoid exploitation by a peer news admin.

Please note that one-byte buffer overflows can not be exploited to execute arbitrary commands by manipulating the saved registers on the stack if the compiler used (gcc >= 3) aligns the stack space.

Nevertheless the code behavior may be manipulated by overwriting local variables. The result is not known but ranges between a denial-of-service condition and privilege escalation.

This update backports bugfixes from the upstream release of cyrus-imapd 2.2.11 announced on:

http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;