CentOS 5 : cyrus-imapd (CESA-2009:1116)

high Nessus Plugin ID 43759

Language:

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated cyrus-imapd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5.

This update has been rated as having important security impact by the Red Hat Security Response Team.

The cyrus-imapd packages contain a high-performance mail server with IMAP, POP3, NNTP, and SIEVE support.

It was discovered that the Cyrus SASL library (cyrus-sasl) does not always reliably terminate output from the sasl_encode64() function used by programs using this library. The Cyrus IMAP server (cyrus-imapd) relied on this function's output being properly terminated. Under certain conditions, improperly terminated output from sasl_encode64() could, potentially, cause cyrus-imapd to crash, disclose portions of its memory, or lead to SASL authentication failures. (CVE-2009-0688)

Users of cyrus-imapd are advised to upgrade to these updated packages, which resolve this issue. After installing the update, cyrus-imapd will be restarted automatically.

Solution

Update the affected cyrus-imapd packages.

See Also

http://www.nessus.org/u?58f97b5b

http://www.nessus.org/u?42ba9f6b

Plugin Details

Severity: High

ID: 43759

File Name: centos_RHSA-2009-1116.nasl

Version: 1.15

Type: local

Agent: unix

Published: 1/6/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:cyrus-imapd-perl, p-cpe:/a:centos:centos:cyrus-imapd, p-cpe:/a:centos:centos:cyrus-imapd-utils, cpe:/o:centos:centos:5, p-cpe:/a:centos:centos:cyrus-imapd-devel

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Patch Publication Date: 6/19/2009

Vulnerability Publication Date: 5/15/2009

Reference Information

CVE: CVE-2009-0688

CWE: 119

RHSA: 2009:1116