OpenPKG CVS Repository http://cvs.openpkg.org/ ____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall Root: /e/openpkg/cvs Email: [EMAIL PROTECTED] Module: openpkg-web Date: 29-Nov-2004 17:19:16 Branch: HEAD Handle: 2004112916191600 Modified files: openpkg-web/security OpenPKG-SA-2004.051-imapd.txt Log: cleanup text Summary: Revision Changes Path 1.2 +21 -21 openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt ____________________________________________________________________________ patch -p0 <<'@@ .' Index: openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt ============================================================================ $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2004.051-imapd.txt --- openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt 29 Nov 2004 15:35:09 -0000 1.1 +++ openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt 29 Nov 2004 16:19:16 -0000 1.2 @@ -18,37 +18,37 @@ Affected Releases: Dependent Packages: none Description: - According to a security advisory from Stefan Esser [0] several - vulnerabilities in imapd. The updated OpenPKG packages fix all these - problems. - - When the option IMAPMAGICPLUS is activated on a server the PROXY and - LOGIN commands suffer a standard stack overflow, because the username - is not checked against a maximum length. The Common Vulnerabilities - and Exposures (CVE) project assigned the id CAN-2004-1011 [2] to the - problem. + According to a security advisory from Stefan Esser [0], several + vulnerabilities exist in Cyrus imapd. The updated OpenPKG packages fix + all these problems. + + When the option "IMAPMAGICPLUS" is activated on a server, the + "PROXY" and "LOGIN" commands suffer a standard stack overflow, + because the username is not checked against a maximum length. The + Common Vulnerabilities and Exposures (CVE) project assigned the id + CAN-2004-1011 [2] to the problem. - Due to a bug within the argument parser of the PARTIAL command - bufferpositions outside the allocated memory buffer may be accessed. + Due to a bug within the argument parser of the "PARTIAL" command + buffer positions outside the allocated memory buffer may be accessed. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-1012 [3] to the problem. - The argument parser of the FETCH command suffers a similar bug. The + The argument parser of the "FETCH" command suffers a similar bug. The Common Vulnerabilities and Exposures (CVE) project assigned the id CAN-2004-1013 [4] to the problem. - Under memory allocation failure conditions the cmd_append handler - supporting MULTIAPPENDS may enter code pathes doing post increments + Under memory allocation failure conditions the "cmd_append" handler + supporting "MULTIAPPENDS" may enter code paths doing post increments whose behavior is undefined in ANSI C. The same function also suffers - from a integer wrap. No CVE. + from a integer wrap. No CVE id. - Another IMAPMAGICPLUS overflow was later discovered by Thomas Klaeger - in proxyd.c proxyd_canon_user function. The Common Vulnerabilities - and Exposures (CVE) project assigned the id CAN-2004-1015 [5] to the - problem. + Another "IMAPMAGICPLUS" overflow was later discovered by Thomas + Klaeger in proxyd.c "proxyd_canon_user" function. The Common + Vulnerabilities and Exposures (CVE) project assigned the id + CAN-2004-1015 [5] to the problem. - Sebastian Krahmer mentioned a missing 0-termination in global.c and - provided a patch. No CVE. + Sebastian Krahmer mentioned a missing NUL-termination in global.c and + provided a patch. No CVE id. Please check whether you are affected by running "<prefix>/bin/openpkg rpm -q imapd". If you have the "imapd" package installed and its @@ . ______________________________________________________________________ The OpenPKG Project www.openpkg.org CVS Repository Commit List [EMAIL PROTECTED]