wake up :)

this bug is big security hole provides DoS and 100% CPU utilization.

Please fix ASAP.


21.11.07, 08:18, umask ([EMAIL PROTECTED]):

> It's big bug :(
> Steps to reproduce.
>  telnet imap.server.net 143
> Trying 192.168.1.1...
> Connected to imap.server.net.
> Escape character is '^]'.
> * OK IMAP4 ready
> a001 login [EMAIL PROTECTED] password
> a001 OK LOGIN completed
> a002 noop
> a002 OK NOOP completed
> a003 SELECT INBOX
> * 1 EXISTS
> * 0 RECENT
> * FLAGS (\Seen \Answered \Deleted \Flagged \Draft)
> * OK [PERMANENTFLAGS (\Seen \Answered \Deleted \Flagged \Draft)]
> * OK [UIDNEXT 791936] Predicted next UID
> * OK [UIDVALIDITY 72365] UID value
> a003 OK [READ-WRITE] SELECT completed
> a004 SEARCH UID 1:279261
> * SEARCH 1
> a004 OK SEARCH completed
> a005 FETCH -14:1 (UID FLAGS)
> And dbmail-imapd proccess which handle IMAP connections enter in loop.
> 20.11.07, 18:39, Marc Dirix ([EMAIL PROTECTED]):
> > I don't think the top or ps outputs are that helpfull,
> > can you provide:
> > 1) mailbox size, message nummer etc for the mailbox that triggers te
> > problem
> > 2) Message, if you can determine which message triggers the problem.
> > 3) Client, is it mailclient related?
> > And maybe a Level5 log, so dev's can parse it.
> > (please remove passwords, and sensitive data).
> > Marc
> > _______________________________________________
> > DBmail mailing list
> > [email protected]
> > https://mailman.fastxs.nl/mailman/listinfo/dbmail
> _______________________________________________
> DBmail mailing list
> [email protected]
> https://mailman.fastxs.nl/mailman/listinfo/dbmail
_______________________________________________
DBmail mailing list
[email protected]
https://mailman.fastxs.nl/mailman/listinfo/dbmail

Reply via email to