An imap security update has been released for Red Hat Enterprise Linux 3
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: imap security update
Advisory ID: RHSA-2005:128-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-128.html
Issue date: 2005-02-23
Updated on: 2005-02-23
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0198
----------------------------------------------------------------------
1. Summary:
Updated imap packages to correct a security vulnerability in CRAM-MD5 authentication are now available for Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
The imap package provides server daemons for both the IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) mail access protocols.
A logic error in the CRAM-MD5 code in the University of Washington IMAP (UW-IMAP) server was discovered. When Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, UW-IMAP does not properly enforce all the required conditions for successful authentication, which could allow remote attackers to authenticate as arbitrary users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0198 to this issue.
All users of imap should upgrade to these updated packages, which contain a backported patch and are not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
145469 - CAN-2005-0198 user validation issue in imap when using CRAM-MD5 authetication
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
ia64:
5e6d328fc48312da633abe55e7a6034e imap-2002d-11.ia64.rpm
980543c94ca17afb7edf519a33438e77 imap-devel-2002d-11.ia64.rpm
ac83beb7897cac768ce91bec28e674c4 imap-utils-2002d-11.ia64.rpm
ppc:
7d902e8d3a7e589bc6bf8667399ec300 imap-2002d-11.ppc.rpm
3ac8da353576a52130dc83f2dff3c4bc imap-devel-2002d-11.ppc.rpm
d2401167861ea55636c881c32811605c imap-utils-2002d-11.ppc.rpm
s390:
8370cf8ec7531f8486fb787ec3d6280c imap-2002d-11.s390.rpm
2018192b39bb7b7657ba838efe5720f2 imap-devel-2002d-11.s390.rpm
9dabfb512ad8ca7b6da646ea42d1cf30 imap-utils-2002d-11.s390.rpm
s390x:
30c5d71303d6eee24b760d086716c4c1 imap-2002d-11.s390x.rpm
d5408c52538e4cb779602dc791436067 imap-devel-2002d-11.s390x.rpm
2887fb3d5b130332f276bca1dbe76fae imap-utils-2002d-11.s390x.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
ia64:
5e6d328fc48312da633abe55e7a6034e imap-2002d-11.ia64.rpm
980543c94ca17afb7edf519a33438e77 imap-devel-2002d-11.ia64.rpm
ac83beb7897cac768ce91bec28e674c4 imap-utils-2002d-11.ia64.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
ia64:
5e6d328fc48312da633abe55e7a6034e imap-2002d-11.ia64.rpm
980543c94ca17afb7edf519a33438e77 imap-devel-2002d-11.ia64.rpm
ac83beb7897cac768ce91bec28e674c4 imap-utils-2002d-11.ia64.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://www.kb.cert.org/vuls/id/702777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0198
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Moderate: imap security update
Advisory ID: RHSA-2005:128-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-128.html
Issue date: 2005-02-23
Updated on: 2005-02-23
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0198
----------------------------------------------------------------------
1. Summary:
Updated imap packages to correct a security vulnerability in CRAM-MD5 authentication are now available for Red Hat Enterprise Linux 3.
This update has been rated as having moderate security impact by the Red Hat Security Response Team.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
The imap package provides server daemons for both the IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) mail access protocols.
A logic error in the CRAM-MD5 code in the University of Washington IMAP (UW-IMAP) server was discovered. When Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, UW-IMAP does not properly enforce all the required conditions for successful authentication, which could allow remote attackers to authenticate as arbitrary users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0198 to this issue.
All users of imap should upgrade to these updated packages, which contain a backported patch and are not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
145469 - CAN-2005-0198 user validation issue in imap when using CRAM-MD5 authetication
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
ia64:
5e6d328fc48312da633abe55e7a6034e imap-2002d-11.ia64.rpm
980543c94ca17afb7edf519a33438e77 imap-devel-2002d-11.ia64.rpm
ac83beb7897cac768ce91bec28e674c4 imap-utils-2002d-11.ia64.rpm
ppc:
7d902e8d3a7e589bc6bf8667399ec300 imap-2002d-11.ppc.rpm
3ac8da353576a52130dc83f2dff3c4bc imap-devel-2002d-11.ppc.rpm
d2401167861ea55636c881c32811605c imap-utils-2002d-11.ppc.rpm
s390:
8370cf8ec7531f8486fb787ec3d6280c imap-2002d-11.s390.rpm
2018192b39bb7b7657ba838efe5720f2 imap-devel-2002d-11.s390.rpm
9dabfb512ad8ca7b6da646ea42d1cf30 imap-utils-2002d-11.s390.rpm
s390x:
30c5d71303d6eee24b760d086716c4c1 imap-2002d-11.s390x.rpm
d5408c52538e4cb779602dc791436067 imap-devel-2002d-11.s390x.rpm
2887fb3d5b130332f276bca1dbe76fae imap-utils-2002d-11.s390x.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
ia64:
5e6d328fc48312da633abe55e7a6034e imap-2002d-11.ia64.rpm
980543c94ca17afb7edf519a33438e77 imap-devel-2002d-11.ia64.rpm
ac83beb7897cac768ce91bec28e674c4 imap-utils-2002d-11.ia64.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/imap-2002d-11.src.rpm
2d7e7e03477577aabeb0f176db08740f imap-2002d-11.src.rpm
i386:
97da6c0d242f8a18dcc547e4000a02a1 imap-2002d-11.i386.rpm
09ad8c9c216ac02298a27ba8afbe55a1 imap-devel-2002d-11.i386.rpm
6755ed4aad9da6dcaaefd653817f4583 imap-utils-2002d-11.i386.rpm
ia64:
5e6d328fc48312da633abe55e7a6034e imap-2002d-11.ia64.rpm
980543c94ca17afb7edf519a33438e77 imap-devel-2002d-11.ia64.rpm
ac83beb7897cac768ce91bec28e674c4 imap-utils-2002d-11.ia64.rpm
x86_64:
80f67d9bf7b6df94118e22a3b32aa53f imap-2002d-11.x86_64.rpm
5bcf24eba1918795fe755b96d8da590b imap-devel-2002d-11.x86_64.rpm
841c05f81ac892ccc9c1f92b5c17203d imap-utils-2002d-11.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://www.kb.cert.org/vuls/id/702777
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0198
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.