[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] [ MDVSA-2009:242-1 ] dovecot
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] [ MDVSA-2009:242-1 ] dovecot
- From: security@xxxxxxxxxxxx
- Date: Tue, 22 Sep 2009 21:02:00 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:242-1
http://www.mandriva.com/security/
_______________________________________________________________________
Package : dovecot
Date : September 22, 2009
Affected: Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability was discovered and corrected in dovecot:
Multiple stack-based buffer overflows in the Sieve plugin in Dovecot
1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve,
allow context-dependent attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a crafted SIEVE
script, as demonstrated by forwarding an e-mail message to a large
number of recipients, a different vulnerability than CVE-2009-2632
(CVE-2009-3235).
This update provides a solution to this vulnerability.
Update:
Packages for Enterprise 5 i586 were missing with the previous
update. This update corrects this.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235
_______________________________________________________________________
Updated Packages:
Mandriva Enterprise Server 5:
69ddbc963444649c512522831aeb8166 mes5/i586/dovecot-1.1.6-0.3mdvmes5.i586.rpm
2fa6c3f8af3f888e48f099f4b07d1d1a
mes5/i586/dovecot-devel-1.1.6-0.3mdvmes5.i586.rpm
b6b9e676056c7739d80b4c2425df74b3
mes5/i586/dovecot-plugins-gssapi-1.1.6-0.3mdvmes5.i586.rpm
d5d3fbe60e47f0171bfc31a09d5e72e8
mes5/i586/dovecot-plugins-ldap-1.1.6-0.3mdvmes5.i586.rpm
4979bf1f77c8ee0e2b84b20fca2aa109 mes5/SRPMS/dovecot-1.1.6-0.3mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
ca263c11aed24c152e3c06a994bb0515
mes5/x86_64/dovecot-1.1.6-0.3mdvmes5.x86_64.rpm
5ad80e1289541b323521dc7793dda71c
mes5/x86_64/dovecot-devel-1.1.6-0.3mdvmes5.x86_64.rpm
eaa15414988d2b355913ce75d647f734
mes5/x86_64/dovecot-plugins-gssapi-1.1.6-0.3mdvmes5.x86_64.rpm
5766c881e399dc37220d23a972d9c2fb
mes5/x86_64/dovecot-plugins-ldap-1.1.6-0.3mdvmes5.x86_64.rpm
4979bf1f77c8ee0e2b84b20fca2aa109 mes5/SRPMS/dovecot-1.1.6-0.3mdvmes5.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKuPUMmqjQ0CJFipgRAmyHAKDfo8gWtSmoAPG1erGiR4GMxoKy3wCfcYkw
LJUTzjvSsciozHD1B6z7on8=
=ogLx
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/