Joined: 12 May 2004
|Posted: Tue Oct 11, 2005 11:29 am Post subject: [ GLSA 200510-10 ] uw-imap: Remote buffer overflow
|Gentoo Linux Security Advisory
Title: uw-imap: Remote buffer overflow (GLSA 200510-10)
Date: October 11, 2005
uw-imap is vulnerable to remote overflow of a buffer in the IMAP server leading to execution of arbitrary code.
uw-imap is the University of Washington's IMAP and POP server daemons.
Vulnerable: < 2004g
Unaffected: >= 2004g
Architectures: All supported architectures
Improper bounds checking of user supplied data while parsing IMAP mailbox names can lead to overflowing the stack buffer.
Successful exploitation requires an authenticated IMAP user to request a malformed mailbox name. This can lead to execution of arbitrary code with the permissions of the IMAP server.
There are no known workarounds at this time.
All uw-imap users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004g"
iDEFENSE Security Advisory
Last edited by GLSA on Sun May 07, 2006 4:59 pm; edited 1 time in total