Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.881318
Category:CentOS Local Security Checks
Title:CentOS Update for cyrus-imapd CESA-2011:0859 centos4 x86_64
Summary:The remote host is missing an update for the 'cyrus-imapd'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'cyrus-imapd'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The cyrus-imapd packages contain a high-performance mail server with IMAP,
POP3, NNTP, and Sieve support.

It was discovered that cyrus-imapd did not flush the received commands
buffer after switching to TLS encryption for IMAP, LMTP, NNTP, and POP3
sessions. A man-in-the-middle attacker could use this flaw to inject
protocol commands into a victim's TLS session initialization messages. This
could lead to those commands being processed by cyrus-imapd, potentially
allowing the attacker to steal the victim's mail or authentication
credentials. (CVE-2011-1926)

Users of cyrus-imapd are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
the update, cyrus-imapd will be restarted automatically.

Affected Software/OS:
cyrus-imapd on CentOS 4

Solution:
Please install the updated packages.

CVSS Score:
5.1

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-1926
CERT/CC vulnerability note: VU#555316
http://www.kb.cert.org/vuls/id/555316
Debian Security Information: DSA-2242 (Google Search)
http://www.debian.org/security/2011/dsa-2242
Debian Security Information: DSA-2258 (Google Search)
http://www.debian.org/security/2011/dsa-2258
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061415.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061374.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:100
http://openwall.com/lists/oss-security/2011/05/17/2
http://openwall.com/lists/oss-security/2011/05/17/15
http://www.redhat.com/support/errata/RHSA-2011-0859.html
http://www.securitytracker.com/id?1025625
http://secunia.com/advisories/44670
http://secunia.com/advisories/44876
http://secunia.com/advisories/44913
http://secunia.com/advisories/44928
XForce ISS Database: cyrus-starttls-command-exec(67867)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67867
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.