![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.52172 |
Kategorie: | FreeBSD Local Security Checks |
Titel: | FreeBSD Ports: cyrus-imapd |
Zusammenfassung: | The remote host is missing an update to the system; as announced in the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update to the system as announced in the referenced advisory. Vulnerability Insight: The following package is affected: cyrus-imapd CVE-2005-0546 Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in 'cached header handling, ' (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. Solution: Update your system with the appropriate patches or software upgrades. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-0546 BugTraq ID: 12636 http://www.securityfocus.com/bid/12636 Bugtraq: 20050228 [USN-87-1] Cyrus IMAP server vulnerability (Google Search) http://marc.info/?l=bugtraq&m=110972236203397&w=2 Conectiva Linux advisory: CLA-2005:937 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000937 http://www.securityfocus.com/archive/1/430294/100/0/threaded http://security.gentoo.org/glsa/glsa-200502-29.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:051 http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10674 http://www.redhat.com/support/errata/RHSA-2005-408.html http://securitytracker.com/id?1013278 http://secunia.com/advisories/14383 |
Copyright | Copyright (C) 2008 E-Soft Inc. |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |