FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-25 11:22:49 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
012b495c-9d51-11de-8d20-001bd3385381cyrus-imapd -- Potential buffer overflow in Sieve

The Cyrus IMAP Server ChangeLog states:

Fixed CERT VU#336053 - Potential buffer overflow in Sieve.


Discovery 2009-09-02
Entry 2009-09-09
Modified 2009-09-14
cyrus-imapd
gt 2.2.0 lt 2.2.13_6

gt 2.3.0 lt 2.3.14_2

CVE-2009-2632
36296
http://www.kb.cert.org/vuls/id/336053
http://www.debian.org/security/2009/dsa-1881
114d70f3-3d16-11d9-8818-008088034841Cyrus IMAPd -- PARTIAL command out of bounds memory corruption

Due to a bug within the argument parser of the partial command an argument like "body[p" will be wrongly detected as "body.peek". Because of this the bufferposition gets increased by 10 instead of 5 and could therefore point outside the allocated memory buffer for the rest of the parsing process. In imapd versions prior to 2.2.7 the handling of "body" or "bodypeek" arguments was broken so that the terminating ']' got overwritten by a '\0'. Combined the two problems allow a potential attacker to overwrite a single byte of malloc() control structures, which leads to remote code execution if the attacker successfully controls the heap layout.


Discovery 2004-11-06
Entry 2004-11-22
Modified 2004-11-24
cyrus-imapd
< 2.1.17

ge 2.2.* le 2.2.6

CVE-2004-1012
http://security.e-matters.de/advisories/152004.html
31952117-3d17-11d9-8818-008088034841Cyrus IMAPd -- APPEND command uses undefined programming construct

To support MULTIAPPENDS the cmd_append handler uses the global stage array. This array is one of the things that gets destructed when the fatal() function is triggered. When the Cyrus IMAP code adds new entries to this array this is done with the help of the postfix increment operator in combination with memory allocation functions. The increment is performed on a global variable counting the number of allocated stages. Because the memory allocation function can fail and therefore internally call fatal() this construct is undefined arcording to ANSI C. This means that it is not clearly defined if the numstage counter is already increased when fatal() is called or not. While older gcc versions increase the counter after the memory allocation function has returned, on newer gcc versions (3.x) the counter gets actually increased before. In such a case the stage destructing process will try to free an uninitialised and maybe attacker supplied pointer. Which again could lead to remote code execution. (Because it is hard for an attacker to let the memory allocation functions fail in the right moment no PoC code for this problem was designed)


Discovery 2004-11-06
Entry 2004-11-22
cyrus-imapd
ge 2.2.7 le 2.2.8

http://security.e-matters.de/advisories/152004.html
35f6fdf8-a425-11d8-9c6d-0020ed76ef5aCyrus IMAP pre-authentication heap overflow vulnerability

In December 2002, Timo Sirainen reported:

Cyrus IMAP server has a remotely exploitable pre-login buffer overflow. [...] Note that you don't have to log in before exploiting this, and since Cyrus runs everything under one UID, it's possible to read every user's mail in the system.

It is unknown whether this vulnerability is exploitable for code execution on FreeBSD systems.


Discovery 2002-12-02
Entry 2004-05-12
Modified 2004-06-27
cyrus-imapd
< 2.0.17

ge 2.1 lt 2.1.11

CVE-2002-1580
6298
740169
http://marc.theaimsgroup.com/?l=bugtraq&m=103886607825605
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.info-cyrus&msg=19349
816fdd8b-3d14-11d9-8818-008088034841Cyrus IMAPd -- IMAPMAGICPLUS preauthentification overflow

When the option imapmagicplus is activated on a server the PROXY and LOGIN commands suffer a standard stack overflow, because the username is not checked against a maximum length when it is copied into a temporary stack buffer. This bug is especially dangerous because it can be triggered before any kind of authentification took place.


Discovery 2004-11-06
Entry 2004-11-22
cyrus-imapd
ge 2.2.4 le 2.2.8

CVE-2004-1011
http://security.e-matters.de/advisories/152004.html
b2d248ad-88f6-11d9-aa18-0001020eed82cyrus-imapd -- multiple buffer overflow vulnerabilities

The Cyrus IMAP Server ChangeLog states:

  • Fix possible single byte overflow in mailbox handling code.
  • Fix possible single byte overflows in the imapd annotate extension.
  • Fix stack buffer overflows in fetchnews (exploitable by peer news server), backend (exploitable by admin), and in imapd (exploitable by users though only on platforms where a filename may be larger than a mailbox name).

The 2.1.X series are reportedly only affected by the second issue.

These issues may lead to execution of arbitrary code with the permissions of the user running the Cyrus IMAP Server.


Discovery 2005-02-14
Entry 2005-02-27
Modified 2005-04-05
cyrus-imapd
< 2.1.18

gt 2.2.* lt 2.2.11

12636
CVE-2005-0546
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
c0a269d5-3d16-11d9-8818-008088034841Cyrus IMAPd -- FETCH command out of bounds memory corruption

The argument parser of the fetch command suffers a bug very similiar to the partial command problem. Arguments like "body[p", "binary[p" or "binary[p" will be wrongly detected and the bufferposition can point outside of the allocated buffer for the rest of the parsing process. When the parser triggers the PARSE_PARTIAL macro after such a malformed argument was received this can lead to a similiar one byte memory corruption and allows remote code execution, when the heap layout was successfully controlled by the attacker.


Discovery 2004-11-06
Entry 2004-11-22
Modified 2004-11-24
cyrus-imapd
< 2.1.17

ge 2.2.* le 2.2.8

CVE-2004-1013
http://security.e-matters.de/advisories/152004.html