![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.52694 |
Category: | Fedora Local Security Checks |
Title: | Fedora Legacy Security Advisory FLSA-2005:152912 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory FLSA-2005:152912. A buffer overflow flaw was found in the c-client IMAP client. An attacker could create a malicious IMAP server that if connected to by a victim could execute arbitrary code on the client machine. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0297 to this issue. A logic error in the CRAM-MD5 code in the University of Washington IMAP (UW-IMAP) server was discovered. When Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, UW-IMAP does not properly enforce all the required conditions for successful authentication, which could allow remote attackers to authenticate as arbitrary users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0198 to this issue. Users of imap are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Affected platforms: Redhat 7.3 Redhat 9 Fedora Core 1 Solution: http://www.securityspace.com/smysecure/catid.html?in=FLSA-2005:152912 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0297 Bugtraq: 20030514 Buffer overflows in multiple IMAP clients (Google Search) http://marc.info/?l=bugtraq&m=105294024124163&w=2 http://www.securityfocus.com/archive/1/430302/100/0/threaded http://www.redhat.com/support/errata/RHSA-2005-015.html http://www.redhat.com/support/errata/RHSA-2005-114.html Common Vulnerability Exposure (CVE) ID: CVE-2005-0198 BugTraq ID: 12391 http://www.securityfocus.com/bid/12391 CERT/CC vulnerability note: VU#702777 http://www.kb.cert.org/vuls/id/702777 http://www.gentoo.org/security/en/glsa/glsa-200502-02.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:026 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11306 http://www.redhat.com/support/errata/RHSA-2005-128.html http://securitytracker.com/id?1013037 http://secunia.com/advisories/14057 http://secunia.com/advisories/14097 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |