Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.54033 |
Kategorie: | SuSE Local Security Checks |
Titel: | SuSE Security Advisory SUSE-SA:2005:009 (cyrus-imapd) |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory SUSE-SA:2005:009. This update fixes one-byte buffer overruns in the cyrus-imapd IMAP server package. Several overruns were fixed in the IMAP annote extension as well as in cached header handling which can be run by an authenticated user. Additionally bounds checking in fetchnews was improved to avoid exploitation by a peer news admin. Please note that one-byte buffer overflows can not be exploited to execute arbitrary commands by manipulating the saved registers on the stack if the compiler used (gcc >= 3) aligns the stack space. Nevertheless the code behavior may be manipulated by overwriting local variables. The result is not known but ranges between a denial-of-service condition and privilege escalation. This update backports bugfixes from the upstream release of cyrus-imapd 2.2.11 announced on: Solution: Update your system with the packages as indicated in the referenced security advisory. http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723 http://www.securityspace.com/smysecure/catid.html?in=SUSE-SA:2005:009 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |