[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[Backports-security-announce] Security Update for uw-imap



Magnus Holmgren uploaded new packages for uw-imap which fixed the
following security problems:

CVE-2008-5005

  Multiple stack-based buffer overflows in (1) University of Washington
  IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine
  2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain
  privileges by specifying a long folder extension argument on the
  command line to the tmail or dmail program; and (b) remote attackers
  to execute arbitrary code by sending e-mail to a destination mailbox
  name composed of a username and '+' character followed by a long
  string, processed by the tmail or possibly dmail program. 

CVE-2008-5006

  smtp.c in the c-client library in University of Washington IMAP
  Toolkit 2007b allows remote SMTP servers to cause a denial of service
  (NULL pointer dereference and application crash) by responding to the
  QUIT command with a close of the TCP connection instead of the
  expected 221 response code. 

CVE-2008-5514

  Off-by-one error in the rfc822_output_char function in the
  RFC822BUFFER routines in the University of Washington (UW) c-client
  library, as used by the UW IMAP toolkit before imap-2007e and other
  applications, allows context-dependent attackers to cause a denial of
  service (crash) via an e-mail message that triggers a buffer overflow. 

For the etch-backports distribution the problems have been fixed in
version 7:2007b~dfsg-4+lenny3~bpo40+1.

For the lenny distribution the problems have been fixed in version
7:2007b~dfsg-4+lenny3.

For the sid distribution the problems have been fixed in version
7:2007d~dfsg-1.


Upgrade instructions
--------------------

If you don't use pinning (see [1]) you have to update the packages
manually via "apt-get -t etch-backports install <packagelist>" with the
packagelist of your installed packages affected by this update.
[1] <http://backports.org/dokuwiki/doku.php?id=instructions>

We recommend to pin the backports repository to 200 so that new versions
of installed  backports will be installed automatically:

  Package: *
  Pin: release a=etch-backports
  Pin-Priority: 200

Attachment: signature.asc
Description: Digital signature


Reply to: