what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SA-1997.07.txt

SA-1997.07.txt
Posted Sep 23, 1999

SA-1997.07.txt

SHA-256 | c3f9b2439f13fd002b037a7c7b33414d9579c524e1e22594ceb2d4c15f59e9b6

SA-1997.07.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

Subject: Caldera Security Advisory 1997.07: Vulnerability in imap package

Caldera Security Advisory SA-1997.07
Original issue date: 6-July-1997
Last revised: 6-July-1997

Topic: Vulnerability in imap

I. Problem Description

The current version of Internet Message Access Protocol (IMAP)
supports both online and offline operation, permitting manipulation
of remote message folders. It provides access to multiple mailboxes
(possibly on multiple servers), and supports nested mailboxes as
well as resynchronization with the server. The current version
also provides a user with the ability to create, delete, and rename
mailboxes. Additional details concerning the functionality of IMAP
can be found in RFC 2060 (the IMAP4rev1 specification) available from

http://ds.internic.net/rfc/rfc2060.txt

The Post Office Protocol (POP) was designed to support offline
mail processing. That is, the client connects to the server to
download mail that the server is holding for the client. The mail
is deleted from the server and is handled offline (locally) on the
client machine.

In both protocols, the server must run with root privileges so
it can access mail folders and undertake some file manipulation
on behalf of the user logging in. After login, these privileges
are discarded. However, a vulnerability exists in the way the
login transaction is handled, and this can be exploited to gain
privileged access on the server. By preparing carefully crafted
text to a system running a vulnerable version of these servers,
remote users may be able to cause a buffer overflow and execute
arbitrary instructions with root privileges.

Information about this vulnerability has been widely distributed.

II. Impact

On systems such as Caldera OpenLinux 1.0 and 1.1, remote users
can obtain root access on systems running a vulnerable IMAP or
POP server. They do not need access to an account on the system
to do this.

III. Solution

Obtain the new imap-4.1.BETA-2.i386.rpm file and install according to
the instructions found in the README file which is one directory up
from the actual rpm file.

This package is located on Caldera's FTP server (ftp.caldera.com):

/pub/openlinux/updates/1.0/current/RPMS
/pub/openlinux/updates/1.1/current/RPMS (Both are the same)

The MD5 checksum (from the "md5sum" command) for this package is:
bc231b563148eda9179aacc40a9e313e imap-4.1.BETA-2.i386.rpm

Please follow the instructions from the README file precisely to
update any older version of imap that may be on your system:


IV. References / Credits

This and other Caldera security resources are located at:

http://www.caldera.com/tech-ref/security/

This advisory is based on the security advisory CERT CA-97.09.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBM8A3LOn+9R4958LpAQFvhwP/T+1Q6gXpIbJxuip/bDlS0T86OXscCWyY
4Kxcivfyy3MLf85xz3VeevRELb4iwThXf16V1YSEydz+kiKUk+EWL8TqcstnBxCD
4ipOhl6KsOqBAsv2PVDh01E1WS6l4IqqxAMOXERO5wOiLJyynzdUZvHWgkAhrcZj
Xqfoy3/wcuQ=
=bBt2
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close