Hi Folks,

        Submitting for your consideration, we have a user here whose
machine turned up with a vulnerability (below.)  He claims the box is
patched to the vulnerability in question without being upgraded to the
version outlines by the plugin and references the following url :
http://packages.debian.org/changelogs/pool/main/c/cyrus21-imapd/cyrus21-
imapd_2.1.18-5.1/changelog

        There are references in that url to each of the CVE's listed in
the plugin.  

        Thoughts?

        Thanks

        --Bryan



--------------Vuln--------------------
Cyrus IMAPD Multiple Remote Vulnerabilities

According to its banner, the remote Cyrus IMAPD server is vulnerable to
a 
remote buffer pre-authentication overflow as well as three
post-authentication
overflows.

An attacker with or without a valid login could exploit those, and would

be able to execute arbitrary commands as the owner of the Cyrus process.

Solution : Upgrade to Cyrus IMAPD 2.2.10 or newer.
Risk factor : High
CVE : CVE-2004-1011, CVE-2004-1012, CVE-2004-1013, CVE-2004-1067
BID : 11729, 11738
Other references : OSVDB:12098

Nessus ID : 15819
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to