Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52172
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: cyrus-imapd
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: cyrus-imapd

CVE-2005-0546
Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow
attackers to execute arbitrary code via (1) an off-by-one error in the
imapd annotate extension, (2) an off-by-one error in 'cached header
handling, ' (3) a stack-based buffer overflow in fetchnews, or (4) a
stack-based buffer overflow in imapd.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-0546
BugTraq ID: 12636
http://www.securityfocus.com/bid/12636
Bugtraq: 20050228 [USN-87-1] Cyrus IMAP server vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=110972236203397&w=2
Conectiva Linux advisory: CLA-2005:937
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000937
http://www.securityfocus.com/archive/1/430294/100/0/threaded
http://security.gentoo.org/glsa/glsa-200502-29.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:051
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=33723
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10674
http://www.redhat.com/support/errata/RHSA-2005-408.html
http://securitytracker.com/id?1013278
http://secunia.com/advisories/14383
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.