You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
72 lines
2.5 KiB
72 lines
2.5 KiB
<?xml version="1.0" encoding="utf-8"?>
|
|
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
|
<glsa id="200403-06">
|
|
<title>Multiple remote buffer overflow vulnerabilities in Courier</title>
|
|
<synopsis>
|
|
Remote buffer overflow vulnerabilities have been found in Courier-IMAP and
|
|
Courier MTA. These exploits may allow the execution of abritrary code,
|
|
allowing unauthorized access to a vulnerable system.
|
|
</synopsis>
|
|
<product type="ebuild">Courier</product>
|
|
<announced>2004-03-26</announced>
|
|
<revised count="01">2004-03-26</revised>
|
|
<bug>45584</bug>
|
|
<access>remote</access>
|
|
<affected>
|
|
<package name="net-mail/courier-imap" auto="yes" arch="*">
|
|
<unaffected range="ge">3.0.0</unaffected>
|
|
<vulnerable range="lt">3.0.0</vulnerable>
|
|
</package>
|
|
<package name="mail-mta/courier" auto="yes" arch="*">
|
|
<unaffected range="ge">0.45</unaffected>
|
|
<vulnerable range="lt">0.45</vulnerable>
|
|
</package>
|
|
</affected>
|
|
<background>
|
|
<p>
|
|
Courier MTA is a multiprotocol mail server suite that provides webmail,
|
|
mailing lists, IMAP, and POP3 services. Courier-IMAP is a standalone server
|
|
that gives IMAP access to local mailboxes.
|
|
</p>
|
|
</background>
|
|
<description>
|
|
<p>
|
|
The vulnerabilities have been found in the 'SHIFT_JIS' converter in
|
|
'shiftjis.c' and 'ISO2022JP' converter in 'so2022jp.c'. An attacker may
|
|
supply Unicode characters that exceed BMP (Basic Multilingual Plane) range,
|
|
causing an overflow.
|
|
</p>
|
|
</description>
|
|
<impact type="normal">
|
|
<p>
|
|
An attacker without privileges may exploit this vulnerability remotely, allowing arbitrary code to be executed in order to gain unauthorized access.
|
|
</p>
|
|
</impact>
|
|
<workaround>
|
|
<p>
|
|
While a workaround is not currently known for this issue, all users are
|
|
advised to upgrade to the latest version of the affected packages.
|
|
</p>
|
|
</workaround>
|
|
<resolution>
|
|
<p>
|
|
All users should upgrade to current versions of the affected packages:
|
|
</p>
|
|
<code>
|
|
# emerge sync
|
|
|
|
# emerge -pv ">=net-mail/courier-imap-3.0.0"
|
|
# emerge ">=net-mail/courier-imap-3.0.0"
|
|
|
|
# ** Or; depending on your installation... **
|
|
|
|
# emerge -pv ">=mail-mta/courier-0.45"
|
|
# emerge ">=mail-mta/courier-0.45"
|
|
</code>
|
|
</resolution>
|
|
<references>
|
|
<uri link="http://www.securityfocus.com/bid/9845">Courier Multiple Remote Buffer Overflow Vulnerabilities</uri>
|
|
<uri link="https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0224">CAN-2004-0224</uri>
|
|
</references>
|
|
</glsa>
|