diff options
author | salo <salo@pkgsrc.org> | 2005-10-05 15:49:44 +0000 |
---|---|---|
committer | salo <salo@pkgsrc.org> | 2005-10-05 15:49:44 +0000 |
commit | 66f44eb00fc1b41a734b4d3f8fabc3807a514359 (patch) | |
tree | 204a803cd6b37517806b5cb3257290d09be49230 /devel | |
parent | afb8e8de5b13a40a626b63c81eaca24fce9f98b5 (diff) | |
download | pkgsrc-66f44eb00fc1b41a734b4d3f8fabc3807a514359.tar.gz |
Security fix for SA17062:
"A vulnerability in UW-imapd can be exploited by malicious users to
cause a DoS (Denial of Service) or compromise a vulnerable system.
The vulnerability is caused due to a boundary error in the
"mail_valid_net_parse_work()" function when copying the user supplied
mailbox name to a stack buffer. This can be exploited to cause a
stack-based buffer overflow via a specially crafted mailbox name that
contains an single opening double-quote character, without the
corresponding closing double-quote.
Successful exploitation allows arbitrary code execution, but requires
valid credentials on the IMAP server."
http://secunia.com/advisories/17062/
www.idefense.com/application/poi/display?id=313&type=vulnerabilities
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2933
Patch from 2004g.
Diffstat (limited to 'devel')
0 files changed, 0 insertions, 0 deletions