oss-sec mailing list archives
Re: CVE request - uw-imap
From: Nico Golde <oss-security+ml () ngolde de>
Date: Mon, 3 Nov 2008 15:49:57 +0100
Hi, * Tomas Hoger <thoger () redhat com> [2008-11-03 15:38]:
uw-imap upstream released new version 2007d on friday, announcing it as security update fixing some issues in dmail and tmail utilities: http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002268.html Further digging into this, the issue seem to be a buffer overflow (strcpy) when handling command line arguments (overlong mailbox specification when utility is called with user+folder argument). This can have security implications in the setups where tmail is installed setuid root (according to the resources I found, that's required in certain configurations; dmail is not expected to run under different user), or when one of the utilities is configured as deliver agent in the MTA.
Patch attached. HTH Nico -- Nico Golde - http://www.ngolde.de - nion () jabber ccc de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
Attachment:
uw-imap.patch
Description:
Attachment:
_bin
Description:
Current thread:
- CVE request - uw-imap Tomas Hoger (Nov 03)
- Re: CVE request - uw-imap Nico Golde (Nov 03)
- Re: CVE request - uw-imap Nico Golde (Nov 03)
- Re: CVE request - uw-imap Nico Golde (Nov 03)