blob: e9fed24633f256d070d10f30c87808101a85bdac [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200603-04">
<title>IMAP Proxy: Format string vulnerabilities</title>
Format string vulnerabilities in IMAP Proxy may lead to the execution of
arbitrary code when connected to malicious IMAP servers.
<product type="ebuild">up-imapproxy</product>
<announced>March 06, 2006</announced>
<revised>March 06, 2006: 01</revised>
<package name="net-mail/up-imapproxy" auto="yes" arch="*">
<unaffected range="ge">1.2.4</unaffected>
<vulnerable range="lt">1.2.4</vulnerable>
IMAP Proxy (also known as up-imapproxy) proxies IMAP transactions
between an IMAP client and an IMAP server.
Steve Kemp discovered two format string errors in IMAP Proxy.
<impact type="normal">
A remote attacker could design a malicious IMAP server and entice
someone to connect to it using IMAP Proxy, resulting in the execution
of arbitrary code with the rights of the victim user.
Only connect to trusted IMAP servers using IMAP Proxy.
All IMAP Proxy users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-mail/up-imapproxy-1.2.4&quot;</code>
<uri link="">CVE-2005-2661</uri>
<metadata tag="requester" timestamp="Sun, 05 Mar 2006 09:44:08 +0000">
<metadata tag="bugReady" timestamp="Sun, 05 Mar 2006 09:44:28 +0000">
<metadata tag="submitter" timestamp="Sun, 05 Mar 2006 15:59:30 +0000">