Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70696
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2377-1)
Summary:The remote host is missing an update for the Debian 'cyrus-imapd-2.2' package(s) announced via the DSA-2377-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'cyrus-imapd-2.2' package(s) announced via the DSA-2377-1 advisory.

Vulnerability Insight:
It was discovered that cyrus-imapd, a highly scalable mail system designed for use in enterprise environments, is not properly parsing mail headers when a client makes use of the IMAP threading feature. As a result, a NULL pointer is dereferenced which crashes the daemon. An attacker can trigger this by sending a mail containing crafted reference headers and access the mail with a client that uses the server threading feature of IMAP.

For the oldstable distribution (lenny), this problem has been fixed in version 2.2.13-14+lenny6.

For the stable distribution (squeeze), this problem has been fixed in version 2.2.13-19+squeeze3.

For the testing (wheezy) and unstable (sid) distributions, this problem has been fixed in cyrus-imapd-2.4 version 2.4.11-1.

We recommend that you upgrade your cyrus-imapd-2.2 packages.

Affected Software/OS:
'cyrus-imapd-2.2' package(s) on Debian 5, Debian 6.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-3481
http://www.mandriva.com/security/advisories?name=MDVSA-2012:037
http://www.redhat.com/support/errata/RHSA-2011-1508.html
XForce ISS Database: cyrus-imap-indexgetids-dos(69842)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69842
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.