summaryrefslogtreecommitdiff
path: root/devel
diff options
context:
space:
mode:
authorsalo <salo@pkgsrc.org>2005-10-05 15:49:44 +0000
committersalo <salo@pkgsrc.org>2005-10-05 15:49:44 +0000
commit66f44eb00fc1b41a734b4d3f8fabc3807a514359 (patch)
tree204a803cd6b37517806b5cb3257290d09be49230 /devel
parentafb8e8de5b13a40a626b63c81eaca24fce9f98b5 (diff)
downloadpkgsrc-66f44eb00fc1b41a734b4d3f8fabc3807a514359.tar.gz
Security fix for SA17062:
"A vulnerability in UW-imapd can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. The vulnerability is caused due to a boundary error in the "mail_valid_net_parse_work()" function when copying the user supplied mailbox name to a stack buffer. This can be exploited to cause a stack-based buffer overflow via a specially crafted mailbox name that contains an single opening double-quote character, without the corresponding closing double-quote. Successful exploitation allows arbitrary code execution, but requires valid credentials on the IMAP server." http://secunia.com/advisories/17062/ www.idefense.com/application/poi/display?id=313&type=vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2933 Patch from 2004g.
Diffstat (limited to 'devel')
0 files changed, 0 insertions, 0 deletions