Hi Folks,
Submitting for your consideration, we have a user here whose
machine turned up with a vulnerability (below.) He claims the box is
patched to the vulnerability in question without being upgraded to the
version outlines by the plugin and references the following url :
http://packages.debian.org/changelogs/pool/main/c/cyrus21-imapd/cyrus21-
imapd_2.1.18-5.1/changelog
There are references in that url to each of the CVE's listed in
the plugin.
Thoughts?
Thanks
--Bryan
--------------Vuln--------------------
Cyrus IMAPD Multiple Remote Vulnerabilities
According to its banner, the remote Cyrus IMAPD server is vulnerable to
a
remote buffer pre-authentication overflow as well as three
post-authentication
overflows.
An attacker with or without a valid login could exploit those, and would
be able to execute arbitrary commands as the owner of the Cyrus process.
Solution : Upgrade to Cyrus IMAPD 2.2.10 or newer.
Risk factor : High
CVE : CVE-2004-1011, CVE-2004-1012, CVE-2004-1013, CVE-2004-1067
BID : 11729, 11738
Other references : OSVDB:12098
Nessus ID : 15819
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus