Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1017288 |
SecurityTracker URL: http://securitytracker.com/id/1017288
|
CVE Reference:
CVE-2006-5973
(Links to External Site)
|
Updated: Nov 28 2006
|
Original Entry Date: Nov 27 2006
|
Impact:
Denial of service via network, Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 1.0test53 through 1.0.rc14
|
Description:
A vulnerability was reported in Dovecot. A remote authenticated user may be able to execute arbitrary code on the target system.
When the 'mmap_disable=yes' configuration setting is enabled, a remote authenticated user can send specially crafted data to trigger a buffer overflow and cause the target service to crash. It may also be possible to execute arbitrary code on the target system, however, code execution was not confirmed in the report.
|
Impact:
A remote authenticated user can cause the target service to crash.
A remote authenticated user may be able to execute arbitrary code on the target system.
|
Solution:
The vendor has issued a fixed version (1.0.rc15).
A patch is also available at:
http://dovecot.org/patches/1.0/file-cache-buffer-overflow-fix.diff
The Dovecot advisory is available at:
http://dovecot.org/list/dovecot-news/2006-November/000023.html
|
Vendor URL: dovecot.org/list/dovecot-news/2006-November/000023.html (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Any), UNIX (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|