cyrus-imapd-2.3.16-6.AXS4.3

エラータID: AXSA:2011-675:01

リリース日: 
2011/12/29 Thursday - 21:09
題名: 
cyrus-imapd-2.3.16-6.AXS4.3
影響のあるチャネル: 
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity: 
High
Description: 

The cyrus-imapd package contains the core of the Cyrus IMAP server. It is a scaleable enterprise mail system designed for use from small to large enterprise environments using standards-based internet mail technologies.
A full Cyrus IMAP implementation allows a seamless mail and bulletin board environment to be set up across multiple servers. It differs from other IMAP server implementations in that it is run on sealed servers, where users are not normally permitted to log in and have no system account on the server. The mailbox database is stored in parts of the filesystem that are private to the Cyrus IMAP server. All user access to mail is through software using the IMAP, POP3 or KPOP protocols. It also includes support for virtual domains, NNTP, mailbox annotations, and much more. The private mailbox database design gives the server large advantages in efficiency, scalability and administratability. Multiple concurrent read/write connections to the same mailbox are permitted. The server supports access control lists on mailboxes and storage quotas on mailbox hierarchies.
The Cyrus IMAP server supports the IMAP4rev1 protocol described in RFC 3501. IMAP4rev1 has been approved as a proposed standard. It supports any authentication mechanism available from the SASL library, imaps/pop3s/nntps (IMAP/POP3/NNTP encrypted using SSL and TLSv1) can be used for security. The server supports single instance store where possible when an email message is addressed to multiple recipients, SIEVE provides server side email filtering.
Security issues fixed with this release:
CVE-2011-1926
The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a plaintext command injection attack, a similar issue to CVE-2011-0411.
CVE-2011-3208
Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.

解決策: 

Update packages.

追加情報: 

From Asianux Server 4 SP1.

ダウンロード: 

SRPMS
  1. cyrus-imapd-2.3.16-6.AXS4.3.src.rpm
    MD5: 9e96937b61263ccb1b460630f9944876
    SHA-256: c3b11a95fbdb6f828f93f9b64b83ce95a0286c1e17e4a1b63b67a10bdd803745
    Size: 2.32 MB

Asianux Server 4 for x86
  1. cyrus-imapd-2.3.16-6.AXS4.3.i686.rpm
    MD5: b53bce36508e7bb1c67cbe810d309704
    SHA-256: 9174ca21fa49b86446736e47ec04fb1e2224388cbd2cb6fab8e48cdce6457541
    Size: 11.09 MB
  2. cyrus-imapd-utils-2.3.16-6.AXS4.3.i686.rpm
    MD5: 1df84b5d6573aca0c44101b4ed508bcf
    SHA-256: 4299db7e3fd38640efc94d76d62296739b954da3924c6cc389f2976fe067f608
    Size: 254.10 kB

Asianux Server 4 for x86_64
  1. cyrus-imapd-2.3.16-6.AXS4.3.x86_64.rpm
    MD5: d22dd7357829e123e6b7d334c44d47b7
    SHA-256: ccc58be717be943e28b66efa180a161ac4d3fa4d7ad366a5b6db3204e943eb4b
    Size: 11.17 MB
  2. cyrus-imapd-utils-2.3.16-6.AXS4.3.x86_64.rpm
    MD5: 2412bf274f7e05584059f4438d0334e4
    SHA-256: 779035932235b7a5b933104fa6b3e4915ecf89919338f2af442fb324e3444e80
    Size: 253.59 kB