[55] in Best-of-Security

home help back first fref pref prev next nref lref last post

BoS: SECURITY: Important fixes for IMAP

daemon@ATHENA.MIT.EDU (Erik Troan)
Tue Mar 4 08:32:09 1997

Date: 	Mon, 3 Mar 1997 16:13:31 -0500
Reply-To: Erik Troan <ewt@REDHAT.COM>
From: Erik Troan <ewt@REDHAT.COM>
Errors-To: best-of-security-request@suburbia.net
To: best-of-security@suburbia.net
Resent-From: best-of-security@suburbia.net

-----BEGIN PGP SIGNED MESSAGE-----


The IMAP servers included with all versions of Red Hat Linux have a buffer
overrun which allow *remote* users to gain root access on systems which run
them. A fix for Red Hat 4.1 is now avaialble (details on it at the end of this
note).

Users of Red Hat 4.0 should apply the Red Hat 4.1 fix. Users of previous
releases of Red Hat Linux are strongly encouraged to upgrade or simply
not run imap. You can remove imap from any machine running with Red
Hat Linux 2.0 or later by running the command "rpm -e imap", rendering them
immune to this problem.

All of the new packages are PGP signed with Red Hat's PGP key (as is
this message), and may be obtained from ftp.redhat.com:/updates/4.1. If
you have direct Internet access, you may upgrade these packages on your
system with the following commands:

Intel:
rpm -Uvh ftp://ftp.redhat.com/updates/4.1/i386/imap-4.1.BETA-3.i386.rpm

Alpha:
rpm -Uvh ftp://ftp.redhat.com/updates/4.1/alpha/imap-4.1.BETA-3.alpha.rpm

SPARC:
rpm -Uvh ftp://ftp.redhat.com/updates/4.1/sparc/imap-4.1.BETA-3.sparc.rpm

Erik

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMxs/AaUg6PHLopv5AQG/ywQAilkPes+iLTI1r7HXRVeZawC3kjRbZAyx
3FcqswteuL482UeZadZoVo9cu0mnwhsjRAMkqs1hF+PgHGmUniR4JymdtIYTPXHa
urZww4fc0A5AIeLwWEPStARipXk3jKDS3VPgKRd8EtQDaj8qAknGIfDBz/ZfFwV2
Aj4cF+TTKJY=
=GfS1
-----END PGP SIGNATURE-----


home help back first fref pref prev next nref lref last post