From jaervosz@gentoo.org Wed Feb 2 05:54:54 2005 From: Sune Kloppenborg Jeppesen To: gentoo-announce@gentoo.org Cc: security-alerts@linuxsecurity.com, bugtraq@securityfocus.com, full-disclosure@lists.netsys.com Date: Wed, 2 Feb 2005 11:24:09 +0100 Subject: [Full-Disclosure] [ GLSA 200502-02 ] UW IMAP: CRAM-MD5 authentication bypass - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200502-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: UW IMAP: CRAM-MD5 authentication bypass Date: February 02, 2005 Bugs: #79874 ID: 200502-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== UW IMAP contains a vulnerability in the code handling CRAM-MD5 authentication allowing authentication bypass. Background ========== UW IMAP is the University of Washington IMAP toolkit which includes POP3 and IMAP daemons. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-mail/uw-imap <= 2004a >= 2004b Description =========== A logic bug in the code handling CRAM-MD5 authentication incorrectly specifies the condition for successful authentication. Impact ====== An attacker could exploit this vulnerability to authenticate as any mail user on a server with CRAM-MD5 authentication enabled. Workaround ========== Disable CRAM-MD5 authentication. Resolution ========== All UW IMAP users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004b" References ========== [ 1 ] US-CERT VU#702777 http://www.kb.cert.org/vuls/id/702777 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200502-02.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2005 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.0 [ Part 1.2, Application/PGP-SIGNATURE 196bytes. ] [ Unable to print this part. ] [ Part 2: "Attached Text" ] _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html