GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Oct 11, 2005 11:29 am Post subject: [ GLSA 200510-10 ] uw-imap: Remote buffer overflow |
|
|
Gentoo Linux Security Advisory
Title: uw-imap: Remote buffer overflow (GLSA 200510-10)
Severity: high
Exploitable: remote
Date: October 11, 2005
Bug(s): #108206
ID: 200510-10
Synopsis
uw-imap is vulnerable to remote overflow of a buffer in the IMAP server leading to execution of arbitrary code.
Background
uw-imap is the University of Washington's IMAP and POP server daemons.
Affected Packages
Package: net-mail/uw-imap
Vulnerable: < 2004g
Unaffected: >= 2004g
Architectures: All supported architectures
Description
Improper bounds checking of user supplied data while parsing IMAP mailbox names can lead to overflowing the stack buffer.
Impact
Successful exploitation requires an authenticated IMAP user to request a malformed mailbox name. This can lead to execution of arbitrary code with the permissions of the IMAP server.
Workaround
There are no known workarounds at this time.
Resolution
All uw-imap users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004g" |
References
CAN-2005-2933
iDEFENSE Security Advisory
Last edited by GLSA on Sun May 07, 2006 4:59 pm; edited 1 time in total |
|