exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

FLSA-2006-170411.txt

FLSA-2006-170411.txt
Posted Apr 6, 2006
Site fedoralegacy.org

Fedora Legacy Update Advisory - Updated imap packages fix security issue.

tags | advisory, imap
systems | linux, fedora
SHA-256 | 2e324f903a96d63be532ae77747c2a8b1fcb89cb45f9539755c21319604d2542

FLSA-2006-170411.txt

Change Mirror Download
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig40A4E746FF5E909BE3E5D343
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated imap packages fix security issue
Advisory ID: FLSA:170411
Issue date: 2006-04-04
Product: Red Hat Linux, Fedora Core
Keywords: Bugfix, Security
CVE Names: CVE-2005-2933
---------------------------------------------------------------------


---------------------------------------------------------------------
1. Topic:

An updated imap package that fixes a buffer overflow issue is now
available.

The imap package provides server daemons for both the IMAP (Internet
Message Access Protocol) and POP (Post Office Protocol) mail access
protocols.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386
Red Hat Linux 9 - i386
Fedora Core 1 - i386

3. Problem description:

A buffer overflow flaw was discovered in the way the c-client library
parses user supplied mailboxes. If an authenticated user requests a
specially crafted mailbox name, it may be possible to execute arbitrary
code on a server that uses the library. The Common Vulnerabilities and
Exposures project has assigned the name CVE-2005-2933 to this issue.

All users of imap should upgrade to these updated packages, which
contain a backported patch and are not vulnerable to this issue.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which
are not installed but included in the list will not be updated. Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt. Many
people find this an easier way to apply updates. To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system. This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www.fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=3D170411

6. RPMs required:

Red Hat Linux 7.3:
SRPM:
http://download.fedoralegacy.org/redhat/7.3/updates/SRPMS/imap-2001a-10.3=
=2Elegacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/7.3/updates/i386/imap-2001a-10.3.=
legacy.i386.rpm
http://download.fedoralegacy.org/redhat/7.3/updates/i386/imap-devel-2001a=
-10.3.legacy.i386.rpm

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/imap-2001a-18.2.l=
egacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/imap-2001a-18.2.le=
gacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/imap-devel-2001a-1=
8.2.legacy.i386.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/imap-2002d-3.2.le=
gacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/imap-2002d-3.2.leg=
acy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/imap-devel-2002d-3=
=2E2.legacy.i386.rpm

7. Verification:

SHA1 sum Package Name
---------------------------------------------------------------------

a516bdac39c9b3946a51e2aa1b2c525418405097
redhat/7.3/updates/i386/imap-2001a-10.3.legacy.i386.rpm
7492a4f5a96f61a50bc1d486004a991407fb8a93
redhat/7.3/updates/i386/imap-devel-2001a-10.3.legacy.i386.rpm
eb6df42d990be3bbf408b9c9cfe759d4ac31d82f
redhat/7.3/updates/SRPMS/imap-2001a-10.3.legacy.src.rpm

dd3d1a3bac748d1db5643a76a86c02568abec7d2
redhat/9/updates/i386/imap-2001a-18.2.legacy.i386.rpm
d7986d8efea12260ebb0613bb6cd486d72ef4ac1
redhat/9/updates/i386/imap-devel-2001a-18.2.legacy.i386.rpm
aef5ef7d054ff02b594bcb2ba564bfbb4778f00b
redhat/9/updates/SRPMS/imap-2001a-18.2.legacy.src.rpm

369fb568801a2d2865a55b2ceabab87e496d8705
fedora/1/updates/i386/imap-2002d-3.2.legacy.i386.rpm
967a77fbc8a4d2dcc3fdfac8b715d7a84537c0c0
fedora/1/updates/i386/imap-devel-2002d-3.2.legacy.i386.rpm
43b5221927cbeb9c2f3387f6a4b8f46f66d4d77d
fedora/1/updates/SRPMS/imap-2002d-3.2.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security. Our key is
available from http://www.fedoralegacy.org/about/security.php

You can verify each package with the following command:

rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

sha1sum <filename>

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2005-2933

9. Contact:

The Fedora Legacy security contact is <secnotice@fedoralegacy.org>. More
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------


--------------enig40A4E746FF5E909BE3E5D343
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEMxMcLMAs/0C4zNoRAiRYAKCKAaDaFkUW8BqHCadxtXF9icMrbACePFd6
hhi9/i/Y89T9YJY9i1Q1Us4=
=F/HL
-----END PGP SIGNATURE-----

--------------enig40A4E746FF5E909BE3E5D343--

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close