Jasper Lievisse Adriaanse wrote:
> On Thu, Mar 01, 2007 at 08:13:51PM +0100, Holger Mauermann wrote:
>> Any chance to see this update in OpenBSD 4.1? Between imapproxy 1.2.3 and
>> 1.2.5 some security issues were fixed...
>
> it helps if you say WHAT issues were fixed.

>From http://www.imapproxy.org/security.php:
There is a serious flaw in all versions of imapproxy prior to 1.2.5rc2 that
can crash it. imapproxy does not properly deal with string literals sent
from clients in Not Authenticated State. This bug is actively exploited by
IMP version 4.1.1, since it may send username data as a string literal as
part of the LOGIN command, and could be exploited by any host on the
internet if a crafted IMAP command is sent to imapproxy in Not Authenticated
State.

And from http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CAN-2005-2661:
Format string vulnerability in the ParseBannerAndCapability function in
main.c for up-imapproxy 1.2.3 and 1.2.4 allows remote IMAP servers to
execute arbitrary code via format string specifiers in a banner or
capability line.


Holger

Reply via email to