Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.72057
Categoría:Mandrake Local Security Checks
Título:Mandriva Security Advisory MDVSA-2011:149 (cyrus-imapd)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing an update to cyrus-imapd
announced via advisory MDVSA-2011:149.

Multiple vulnerabilities has been discovered and corrected in
cyrus-imapd:

Stack-based buffer overflow in the split_wildmats function in nntpd.c
in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11
allows remote attackers to execute arbitrary code via a crafted NNTP
command (CVE-2011-3208).

Secunia Research has discovered a vulnerability in Cyrus IMAPd,
which can be exploited by malicious people to bypass certain security
restrictions. The vulnerability is caused due to an error within the
authentication mechanism of the NNTP server, which can be exploited
to bypass the authentication process and execute commands intended
for authenticated users by sending an AUTHINFO USER command without
a following AUTHINFO PASS command (CVE-2011-3372).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct these issues.

Affected: 2009.0, 2010.1, 2011., Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2011:149

Risk factor : High

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-3208
BugTraq ID: 49534
http://www.securityfocus.com/bid/49534
Debian Security Information: DSA-2318 (Google Search)
http://www.debian.org/security/2011/dsa-2318
http://www.mandriva.com/security/advisories?name=MDVSA-2011:149
http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
http://www.osvdb.org/75307
http://www.redhat.com/support/errata/RHSA-2011-1317.html
http://securitytracker.com/id?1026031
http://secunia.com/advisories/45938
http://secunia.com/advisories/45975
http://secunia.com/advisories/46064
SuSE Security Announcement: SUSE-SU-2011:1034 (Google Search)
https://hermes.opensuse.org/messages/11723935
SuSE Security Announcement: openSUSE-SU-2011:1036 (Google Search)
http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
XForce ISS Database: cyrus-splitwildmats-bo(69679)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
Common Vulnerability Exposure (CVE) ID: CVE-2011-3372
http://secunia.com/secunia_research/2011-68
http://www.redhat.com/support/errata/RHSA-2011-1508.html
http://securitytracker.com/id?1026363
http://secunia.com/advisories/46093
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.