[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2318-1 cyrus-imapd-2.2 -- multiple

ID: oval:org.secpod.oval:def:600670Date: (C)2012-01-30   (M)2022-10-10
Class: PATCHFamily: unix




Multiple security issues have been discovered in cyrus-imapd, a highly scalable mail system designed for use in enterprise environments. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-3208 Coverity discovered a stack-based buffer overflow in the NNTP server implementation of cyrus-imapd. An attacker can exploit this flaw via several crafted NNTP commands to execute arbitrary code. CVE-2011-3372 Stefan Cornelius of Secunia Research discovered that the command processing of the NNTP server implementation of cyrus-imapd is not properly implementing access restrictions for certain commands and is not checking for a complete, successful authentication. An attacker can use this flaw to bypass access restrictions for some commands and, e.g. exploit CVE-2011-3208 without proper authentication.

Platform:
Debian 5.0
Debian 6.0
Product:
cyrus-imapd-2.2
Reference:
DSA-2318-1
CVE-2011-3372
CVE-2011-3208
CVE    2
CVE-2011-3372
CVE-2011-3208
CPE    3
cpe:/a:cyrus:cyrus-imapd-2.2
cpe:/o:debian:debian_linux:5.0
cpe:/o:debian:debian_linux:6.0

© SecPod Technologies