[go: up one dir, main page]

oss-sec mailing list archives

Re: CVE request - uw-imap


From: Nico Golde <oss-security+ml () ngolde de>
Date: Mon, 3 Nov 2008 15:49:57 +0100

Hi,
* Tomas Hoger <thoger () redhat com> [2008-11-03 15:38]:
uw-imap upstream released new version 2007d on friday, announcing it as
security update fixing some issues in dmail and tmail utilities:

http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html
http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002268.html

Further digging into this, the issue seem to be a buffer overflow
(strcpy) when handling command line arguments (overlong mailbox
specification when utility is called with user+folder argument). This
can have security implications in the setups where tmail is installed 
setuid root (according to the resources I found, that's required in
certain configurations; dmail is not expected to run under different
user), or when one of the utilities is configured as deliver agent in
the MTA.

Patch attached.
HTH

Nico
-- 
Nico Golde - http://www.ngolde.de - nion () jabber ccc de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: uw-imap.patch
Description:

Attachment: _bin
Description:


Current thread: