[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:149 -- Mandriva cyrus-imapd

ID: oval:org.secpod.oval:def:301113Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




Multiple vulnerabilities has been discovered and corrected in cyrus-imapd: Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command . Secunia Research has discovered a vulnerability in Cyrus IMAPd, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error within the authentication mechanism of the NNTP server, which can be exploited to bypass the authentication process and execute commands intended for authenticated users by sending an AUTHINFO USER command without a following AUTHINFO PASS command . Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Product:
cyrus-imapd
Reference:
MDVSA-2011:149
CVE-2011-3372
CVE-2011-3208
CVE    2
CVE-2011-3372
CVE-2011-3208
CPE    2
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2010.1

© SecPod Technologies