Szymon Juraszczyk wrote:
> 
> On Mon, 2001-10-01 at 04:02:52, Szymon Juraszczyk wrote:
> 
> > On Sun, 2001-09-30 at 23:30:38, Szymon Juraszczyk wrote:
> >
> > > On Sun, 2001-09-30 at 17:04:34, Tarjei Huse wrote:
> > >
> > > > > Are you using PAM/LDAP? If so check the recent archives (about 4 weeks ago)
> > > > > for a very long thread regarding a memory allocation problem between
> > > > > OpenLDAP and Cyrus. I'm not sure what the resolution was in the end... Using
> > > > > saslauthd from the new SASL version would almost certainly fix it though.
> > > > Or just using the sasl-ldap patch from cyrus-utils.sf.net.
> > > >
> > > > Tarjei
> > >
> > >   I use so called 'IP-Plus' patch, which adds a few new authentication
> > > methods to SASL (LDAP, PostgreSQL, BerkleyDB). I'll try the patch you
> > > mentioned then and post the results of my struggle to the list.
> >
> >   So, as I promised, I'm posting the results of my struggle. The lmtpd
> > signal 11 problem seems to be unrelated to LDAP at all. I figured out that
> > it crashes, when the header of the e-mail message is bigger than some
> > 2,5 KB (!?!?!). It's ridiculous, don't you think !? Is this a normal behaviour
> > or is due to some kind of copile-time mishap? I'm investigating the problem
> > anyway.
> 
>   Sorry guys for replying to my own message twice, but I've got more
> exciting news and updated information about the bug. The problem is not big
> header in general, but big 'To:' field (and possibly others). Yes, it
> happens that e-mail messages have To: field composed of 50 or more lines
> (I've got loads of monster-messages like this stuffing my mail queue). There
> must be a buffer overrun somewere there, possibly in the code generating
> notify (I use notify through a unix socket). Who knows, that might even
> be a remotely exploitable hole if that's a classig buffer overrun.
> 
>  I'm sending Cc: of this letter to [EMAIL PROTECTED]

If you are using fetchmail look here:

Thomas Biege wrote:
> 
>   Fetchmail is a tool for retrieving and forwarding mail. Two vulnerabilities
>   in the code of fetchmail were found in the last weeks.
>     1.) By sending a header with a large "To:" line a buffer overflow will
>         be triggered in the header parsing code.
>     2.) By impersonating a pop3 or imap server by using DNS spoofing
>         or getting control over the pop3/imap server an attacker could
>         trigger a buffer overflow in the pop3 and imap code of fetchmail.
>         All the attacker has to do is to fake a LIST response message and
>         providing two integers. One will used as index for a stack array
>         and the other one is the value written to this index.
>   Both vulnerabilities could be used to get remote access to the system with
>   the privilege of the user running fetchmail.
> 

it' s from 08/17/01

cu Gerald

Reply via email to