Plugin ID | 339 |
Plugin name | Cyrus IMAP server prior 2.2.10 multiple remote vulnerabilities |
Plugin filename | Cyrus IMAP server prior 2.2.10 multiple remote vulnerabilities.plugin |
Plugin filesize | 2482 bytes |
Plugin family | SMTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/09 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 143 |
Plugin procedure detection | open|sleep|close|pattern_exists "(1\..*|2\.([0-1]\..*|2\.[0-9][0-9].*))"* |
Plugin detection accuracy | 80 |
Plugin comment | The NASL script is Copyright (C) 2004 Tenable Network Security |
Bug produced name | Cyrus |
Bug affected | Cyrus IMAP server prior 2.2.10 |
Bug not affected | Cyrus IMAP server newer than 2.2.10 |
Bug vulnerability class | Unknown |
Bug description | According to its banner, the remote Cyrus IMAPD server is vulnerable to a remote buffer pre-authentication overflow as well as three post-authentication overflows. An attacker with or without a valid login could exploit those, and would be able to execute arbitrary commands as the owner of the Cyrus process. |
Bug solution | Upgrade to Cyrus IMAPD 2.2.10 or newer. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/11729/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 6 |
Bug simplicity | 6 |
Bug impact | 9 |
Bug risk | 7 |
Bug Nessus risk | High |
Bug check tools | Nessus can check this flaw with the plugin 15819 (Cyrus IMAPD Multiple Remote Vulnerabilities). |
Source SecurityFocus BID | 11729 |
Source Nessus ID | 15819 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |