SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Cyrus IMAP Server Vendors:   Carnegie Mellon University
Cyrus IMAP Server Buffer Overflow in Sieve Component Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID:  1022863
SecurityTracker URL:  http://securitytracker.com/id/1022863
CVE Reference:   CVE-2009-2632   (Links to External Site)
Date:  Sep 9 2009
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.2.13, 2.3.14
Description:   A vulnerability was reported in Cyrus IMAP Server. A local user can obtain elevated privileges on the target system.

A local user with the ability to create a SIEVE script can create a specially crafted SIEVE script that will trigger a buffer overflow and execute arbitrary code on the target system with elevated privileges. The local user can exploit this to read and modify arbitrary email messages on the target system.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a source code fix.

A patch is available at:

https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sieve/script.c.diff?r1=1.62&r2=1.62.2.1&only_with_tag=cyrus-imapd-2_2-tail

Vendor URL:  cyrusimap.web.cmu.edu/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Sep 23 2009 (Red Hat Issues Fix) Cyrus IMAP Server Buffer Overflow in Sieve Component Lets Local Users Gain Elevated Privileges
Red Hat has released a fix for Red Hat Enterprise Linux 4 and 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC