From owner-freebsd-ports-bugs@FreeBSD.ORG Sun Nov 16 19:20:02 2008 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 6D2591065674 for ; Sun, 16 Nov 2008 19:20:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 525678FC1C for ; Sun, 16 Nov 2008 19:20:02 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id mAGJK2J0032844 for ; Sun, 16 Nov 2008 19:20:02 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id mAGJK20t032843; Sun, 16 Nov 2008 19:20:02 GMT (envelope-from gnats) Resent-Date: Sun, 16 Nov 2008 19:20:02 GMT Resent-Message-Id: <200811161920.mAGJK20t032843@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Mark Foster Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 835011065679 for ; Sun, 16 Nov 2008 19:18:19 +0000 (UTC) (envelope-from mark@foster.cc) Received: from mail.bitpusher.com (mail.bitpusher.com [208.75.56.13]) by mx1.freebsd.org (Postfix) with ESMTP id 745898FC0C for ; Sun, 16 Nov 2008 19:18:19 +0000 (UTC) (envelope-from mark@foster.cc) Received: from [192.168.1.246] (c-24-17-96-78.hsd1.wa.comcast.net [24.17.96.78]) by mail.bitpusher.com (Postfix) with ESMTP id 683884C057 for ; Sun, 16 Nov 2008 10:53:39 -0800 (PST) Message-Id: <49206C33.6050707@foster.cc> Date: Sun, 16 Nov 2008 10:53:39 -0800 From: Mark Foster To: freebsd-gnats-submit@FreeBSD.org Cc: Subject: ports/128923: vuxml update for security vulnerability: mail/imap-uw X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Nov 2008 19:20:02 -0000 >Number: 128923 >Category: ports >Synopsis: vuxml update for security vulnerability: mail/imap-uw >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: update >Submitter-Id: current-users >Arrival-Date: Sun Nov 16 19:20:02 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Mark Foster >Release: FreeBSD 7.0-RELEASE-p3 i386 >Organization: >Environment: System: FreeBSD gomer.foster.dmz 7.0-RELEASE-p3 FreeBSD 7.0-RELEASE-p3 #6: Wed Aug 27 05:57:37 PDT 2008 root@gomer.foster.dmz:/usr/obj/usr/src/sys/GENERIC i386 >Description: >How-To-Repeat: >Fix: --- imap-uw.patch begins here --- --- vuln.xml.old 2008-11-11 02:07:56.000000000 -0800 +++ vuln.xml 2008-11-11 02:15:43.000000000 -0800 @@ -34,6 +34,33 @@ --> + + imap-uw -- "tmail" and "dmail" Local Buffer Overflow Vulnerabilities + + + imap-uw + 2007d + + + + +

SANS reports:

+
+

University of Washington "tmail" and "dmail" are mail deliver agents. "tmail" and "dmail" are exposed to local buffer overflow issues because they fail to perform adequate boundary checks on user-supplied data.

+
+ +
+ + + http://www.washington.edu/imap/documentation/RELNOTES.html + + + + 2008-10-29 + 2008-11-11 + +
+ trac -- potential DOS vulnerability --- imap-uw.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted: