OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   29-Nov-2004 17:19:16
  Branch: HEAD                             Handle: 2004112916191600

  Modified files:
    openpkg-web/security    OpenPKG-SA-2004.051-imapd.txt

  Log:
    cleanup text

  Summary:
    Revision    Changes     Path
    1.2         +21 -21     openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2004.051-imapd.txt
  --- openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt        29 Nov 2004 
15:35:09 -0000      1.1
  +++ openpkg-web/security/OpenPKG-SA-2004.051-imapd.txt        29 Nov 2004 
16:19:16 -0000      1.2
  @@ -18,37 +18,37 @@
   Affected Releases:   Dependent Packages: none
   
   Description:
  -  According to a security advisory from Stefan Esser [0] several
  -  vulnerabilities in imapd. The updated OpenPKG packages fix all these
  -  problems.
  -
  -  When the option IMAPMAGICPLUS is activated on a server the PROXY and
  -  LOGIN commands suffer a standard stack overflow, because the username
  -  is not checked against a maximum length. The Common Vulnerabilities
  -  and Exposures (CVE) project assigned the id CAN-2004-1011 [2] to the
  -  problem.
  +  According to a security advisory from Stefan Esser [0], several
  +  vulnerabilities exist in Cyrus imapd. The updated OpenPKG packages fix
  +  all these problems.
  +
  +  When the option "IMAPMAGICPLUS" is activated on a server, the
  +  "PROXY" and "LOGIN" commands suffer a standard stack overflow,
  +  because the username is not checked against a maximum length. The
  +  Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2004-1011 [2] to the problem.
   
  -  Due to a bug within the argument parser of the PARTIAL command
  -  bufferpositions outside the allocated memory buffer may be accessed.
  +  Due to a bug within the argument parser of the "PARTIAL" command
  +  buffer positions outside the allocated memory buffer may be accessed.
     The Common Vulnerabilities and Exposures (CVE) project assigned the id
     CAN-2004-1012 [3] to the problem.
   
  -  The argument parser of the FETCH command suffers a similar bug. The
  +  The argument parser of the "FETCH" command suffers a similar bug. The
     Common Vulnerabilities and Exposures (CVE) project assigned the id
     CAN-2004-1013 [4] to the problem.
   
  -  Under memory allocation failure conditions the cmd_append handler
  -  supporting MULTIAPPENDS may enter code pathes doing post increments
  +  Under memory allocation failure conditions the "cmd_append" handler
  +  supporting "MULTIAPPENDS" may enter code paths doing post increments
     whose behavior is undefined in ANSI C. The same function also suffers
  -  from a integer wrap. No CVE.
  +  from a integer wrap. No CVE id.
     
  -  Another IMAPMAGICPLUS overflow was later discovered by Thomas Klaeger
  -  in proxyd.c proxyd_canon_user function. The Common Vulnerabilities
  -  and Exposures (CVE) project assigned the id CAN-2004-1015 [5] to the
  -  problem.
  +  Another "IMAPMAGICPLUS" overflow was later discovered by Thomas
  +  Klaeger in proxyd.c "proxyd_canon_user" function. The Common
  +  Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2004-1015 [5] to the problem.
     
  -  Sebastian Krahmer mentioned a missing 0-termination in global.c and
  -  provided a patch. No CVE.
  +  Sebastian Krahmer mentioned a missing NUL-termination in global.c and
  +  provided a patch. No CVE id.
     
     Please check whether you are affected by running "<prefix>/bin/openpkg
     rpm -q imapd". If you have the "imapd" package installed and its
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to