RedHat: Low: imap security update

    Date18 Feb 2005
    CategoryRed Hat
    6549
    Posted ByJoe Shakespeare
    Updated imap packages that fix a security issue are now available for Red Hat Enterprise Linux 2.1. This update has been rated as having low security impact by the Red Hat Security Response Team.
    - ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Low: imap security update
    Advisory ID:       RHSA-2005:114-01
    Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-114.html
    Issue date:        2005-02-18
    Updated on:        2005-02-18
    Product:           Red Hat Enterprise Linux
    CVE Names:         CAN-2003-0297
    - ---------------------------------------------------------------------
    
    1. Summary:
    
    Updated imap packages that fix a security issue are now available for Red
    Hat Enterprise Linux 2.1.
    
    This update has been rated as having low security impact by the Red Hat
    Security Response Team.
    
    2. Relevant releases/architectures:
    
    Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
    Red Hat Linux Advanced Workstation 2.1 - ia64
    Red Hat Enterprise Linux ES version 2.1 - i386
    
    3. Problem description:
    
    The imap package provides server daemons for both the IMAP (Internet
    Message Access Protocol) and POP (Post Office Protocol) mail access
    protocols.
    
    A buffer overflow flaw was found in the c-client IMAP client.  An attacker
    could create a malicious IMAP server that if connected to by a victim could
    execute arbitrary code on the client machine.  The Common Vulnerabilities
    and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0297
    to this issue.
    
    Users of imap are advised to upgrade to these updated packages, which
    contain a backported patch to correct this issue.
    
    4. Solution:
    
    Before applying this update, make sure that all previously-released
    errata relevant to your system have been applied.  Use Red Hat
    Network to download and update your packages.  To launch the Red Hat
    Update Agent, use the following command:
    
        up2date
    
    For information on how to install packages manually, refer to the
    following Web page for the System Administration or Customization
    guide specific to your system:
    
        http://www.redhat.com/docs/manuals/enterprise/
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/):
    
    97344 - CAN-2003-0297 c-client imap issue
    
    6. RPMs required:
    
    Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/imap-2001a-11.0as.src.rpm
    9e1292058931aa176223e9cbf553d44f  imap-2001a-11.0as.src.rpm
    
    i386:
    c938f43eedcfd404d05e5852e6dc68d1  imap-2001a-11.0as.i386.rpm
    be2e164e602d430cc75be33cbc19caf2  imap-devel-2001a-11.0as.i386.rpm
    
    ia64:
    b8eefa1621ec847853338ccd7ddd1145  imap-2001a-11.0as.ia64.rpm
    cdbd9327ae35f1017542e03110dd26ae  imap-devel-2001a-11.0as.ia64.rpm
    
    Red Hat Linux Advanced Workstation 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/imap-2001a-11.0as.src.rpm
    9e1292058931aa176223e9cbf553d44f  imap-2001a-11.0as.src.rpm
    
    ia64:
    b8eefa1621ec847853338ccd7ddd1145  imap-2001a-11.0as.ia64.rpm
    cdbd9327ae35f1017542e03110dd26ae  imap-devel-2001a-11.0as.ia64.rpm
    
    Red Hat Enterprise Linux ES version 2.1:
    
    SRPMS:
    ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/imap-2001a-11.0as.src.rpm
    9e1292058931aa176223e9cbf553d44f  imap-2001a-11.0as.src.rpm
    
    i386:
    c938f43eedcfd404d05e5852e6dc68d1  imap-2001a-11.0as.i386.rpm
    be2e164e602d430cc75be33cbc19caf2  imap-devel-2001a-11.0as.i386.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and 
    details on how to verify the signature are available from
    https://www.redhat.com/security/team/key/#package
    
    7. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0297
    
    8. Contact:
    
    The Red Hat security contact is .  More contact
    details at https://www.redhat.com/security/team/contact/
    
    Copyright 2005 Red Hat, Inc.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.