lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1P2sMC-0002YR-US@titan.mandriva.com>
Date: Mon, 04 Oct 2010 23:14:00 +0200
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDVSA-2010:196 ] dovecot

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:196
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : dovecot
 Date    : October 4, 2010
 Affected: 2009.1
 _______________________________________________________________________

 Problem Description:

 A vulnerability was discovered and corrected in dovecot:
 
 Multiple stack-based buffer overflows in the Sieve plugin in Dovecot
 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve,
 allow context-dependent attackers to cause a denial of service
 (crash) and possibly execute arbitrary code via a crafted SIEVE
 script, as demonstrated by forwarding an e-mail message to a large
 number of recipients, a different vulnerability than CVE-2009-2632
 (CVE-2009-3235).
 
 Packages for 2009.1 were missing with the previous MDVSA-2009:242
 update. This update corrects this.
 
 This update provides a solution to this vulnerability.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2009.1:
 58dd261d6fe3b9f94d8e968d8022321d  2009.1/i586/dovecot-1.1.13-1.1mdv2009.1.i586.rpm
 5e8a430fdd0093e6dbfd2abd5a86d302  2009.1/i586/dovecot-devel-1.1.13-1.1mdv2009.1.i586.rpm
 23f57ab84ea636663c85adcdc8cf3be0  2009.1/i586/dovecot-plugins-gssapi-1.1.13-1.1mdv2009.1.i586.rpm
 46f12749940acc5ce034ffacf9580997  2009.1/i586/dovecot-plugins-ldap-1.1.13-1.1mdv2009.1.i586.rpm 
 29f58fe99963479329144451697fb931  2009.1/SRPMS/dovecot-1.1.13-1.1mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 bfaa46586c4f105bd50ae99a67f54a26  2009.1/x86_64/dovecot-1.1.13-1.1mdv2009.1.x86_64.rpm
 578b62118307db05883dc45cbbc97e89  2009.1/x86_64/dovecot-devel-1.1.13-1.1mdv2009.1.x86_64.rpm
 67b92edd0c14384b64a9fe2d4f0e56ac  2009.1/x86_64/dovecot-plugins-gssapi-1.1.13-1.1mdv2009.1.x86_64.rpm
 685e97a30598ce8eef9cc7adee24f369  2009.1/x86_64/dovecot-plugins-ldap-1.1.13-1.1mdv2009.1.x86_64.rpm 
 29f58fe99963479329144451697fb931  2009.1/SRPMS/dovecot-1.1.13-1.1mdv2009.1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFMqhgxmqjQ0CJFipgRAqzHAJ90VLBfVRcfsdqZrDBxD9c+2h3QkQCgzbEJ
BqXwNFxV/e6xTK/4fIiQUN4=
=OSh/
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ