Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.69674
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2011:100 (cyrus-imapd)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to cyrus-imapd
announced via advisory MDVSA-2011:100.

A vulnerability has been identified and fixed in cyrus-imapd:

The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does
not properly restrict I/O buffering, which allows man-in-the-middle
attackers to insert commands into encrypted sessions by sending a
cleartext command that is processed after TLS is in place, related to
a plaintext command injection attack, a similar issue to CVE-2011-0411
(CVE-2011-1926).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.

Affected: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2011:100

Risk factor : High

CVSS Score:
6.8

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-0411
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html
BugTraq ID: 46767
http://www.securityfocus.com/bid/46767
CERT/CC vulnerability note: VU#555316
http://www.kb.cert.org/vuls/id/555316
Debian Security Information: DSA-2233 (Google Search)
http://www.debian.org/security/2011/dsa-2233
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056560.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056559.html
http://security.gentoo.org/glsa/glsa-201206-33.xml
http://www.openwall.com/lists/oss-security/2021/08/10/2
http://www.osvdb.org/71021
http://www.redhat.com/support/errata/RHSA-2011-0422.html
http://www.redhat.com/support/errata/RHSA-2011-0423.html
http://securitytracker.com/id?1025179
http://secunia.com/advisories/43646
http://secunia.com/advisories/43874
SuSE Security Announcement: SUSE-SR:2011:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html
http://www.vupen.com/english/advisories/2011/0611
http://www.vupen.com/english/advisories/2011/0752
http://www.vupen.com/english/advisories/2011/0891
XForce ISS Database: multiple-starttls-command-execution(65932)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65932
Common Vulnerability Exposure (CVE) ID: CVE-2011-1926
1025625
http://www.securitytracker.com/id?1025625
44670
http://secunia.com/advisories/44670
44876
http://secunia.com/advisories/44876
44913
http://secunia.com/advisories/44913
44928
http://secunia.com/advisories/44928
DSA-2242
http://www.debian.org/security/2011/dsa-2242
DSA-2258
http://www.debian.org/security/2011/dsa-2258
FEDORA-2011-7193
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061415.html
FEDORA-2011-7217
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061374.html
MDVSA-2011:100
http://www.mandriva.com/security/advisories?name=MDVSA-2011:100
RHSA-2011:0859
http://www.redhat.com/support/errata/RHSA-2011-0859.html
VU#555316
[oss-security] 20110517 CVE Request -- Cyrus-IMAP STARTTLS issue -- [was: Re: pure-ftpd STARTTLS command injection / new CVE?]
http://openwall.com/lists/oss-security/2011/05/17/2
[oss-security] 20110517 Re: CVE Request -- Cyrus-IMAP STARTTLS issue -- [was: Re: pure-ftpd STARTTLS command injection / new CVE?]
http://openwall.com/lists/oss-security/2011/05/17/15
cyrus-starttls-command-exec(67867)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67867
http://bugzilla.cyrusimap.org/show_bug.cgi?id=3423
http://bugzilla.cyrusimap.org/show_bug.cgi?id=3424
http://git.cyrusimap.org/cyrus-imapd/patch/?id=523a91a5e86c8b9a27a138f04a3e3f2d8786f162
http://www.cyrusimap.org/docs/cyrus-imapd/2.4.7/changes.php
https://bugzilla.redhat.com/show_bug.cgi?id=705288
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.