Update: imapd BODY command overflow

EnGarde has released updated imapd packages, which fix a buffer overflow vulnerability in imap. This vulnerability could allow a remote, authenticated user to send a malformed request to trigger the overflow and execute commands as the user which imapd is running under.

The update is available at:

http://archives.neohapsis.com/archives/linux/engarde/2002-q2/0007.html

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Neohapsis

Show Comments