First published: Tue May 17 2011(Updated: )
It was found, that Cyrus IMAP recognized IMAP, LMTP, NNTP and POP3 protocol commands during plaintex to TLS session switch (by TLS protocol initialization). A remote attacker could use this flaw to insert plaintext, protocol relevant, commands into TLS protocol initialization messages, leading to execution of these commands during the ciphertext protocol phase, potentially allowing the attacker to steal the victim's mail or authentication credentials. References: [1] <a href="http://www.kb.cert.org/vuls/id/555316">http://www.kb.cert.org/vuls/id/555316</a> [2] <a href="http://bugzilla.cyrusimap.org/show_bug.cgi?id=3423">http://bugzilla.cyrusimap.org/show_bug.cgi?id=3423</a> Relevant upstream patch: [3] <a href="http://git.cyrusimap.org/cyrus-imapd/patch/?id=523a91a5e86c8b9a27a138f04a3e3f2d8786f162">http://git.cyrusimap.org/cyrus-imapd/patch/?id=523a91a5e86c8b9a27a138f04a3e3f2d8786f162</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus IMAP Server | =2.2.12 | |
Cyrus IMAP Server | =2.3.13 | |
Cyrus IMAP Server | =2.2.13p1 | |
Cyrus IMAP Server | =2.3.12 | |
Cyrus IMAP Server | =2.4.1 | |
Cyrus IMAP Server | =2.1.17 | |
Cyrus IMAP Server | =2.4.5 | |
Cyrus IMAP Server | =2.3.6 | |
Cyrus IMAP Server | =2.3.0 | |
Cyrus IMAP Server | =2.2.11 | |
Cyrus IMAP Server | =2.3.14 | |
Cyrus IMAP Server | =2.3.2 | |
Cyrus IMAP Server | <=2.4.6 | |
Cyrus IMAP Server | =2.4.0 | |
Cyrus IMAP Server | =2.3.11 | |
Cyrus IMAP Server | =2.3.8 | |
Cyrus IMAP Server | =2.3.5 | |
Cyrus IMAP Server | =2.2.9 | |
Cyrus IMAP Server | =2.4.3 | |
Cyrus IMAP Server | =2.4.4 | |
Cyrus IMAP Server | =2.3.9 | |
Cyrus IMAP Server | =2.3.10 | |
Cyrus IMAP Server | =2.2.13 | |
Cyrus IMAP Server | =2.1.16 | |
Cyrus IMAP Server | =2.3.7 | |
Cyrus IMAP Server | =2.2.8 | |
Cyrus IMAP Server | =2.3.16 | |
Cyrus IMAP Server | =2.0.17 | |
Cyrus IMAP Server | =2.3.1 | |
Cyrus IMAP Server | =2.4.2 | |
Cyrus IMAP Server | =2.3.4 | |
Cyrus IMAP Server | =2.2.10 | |
Cyrus IMAP Server | =2.1.18 | |
Cyrus IMAP Server | =2.3.3 | |
Cyrus IMAP Server | =2.3.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1926 has a moderate severity rating due to its potential to allow remote attackers to execute arbitrary commands during a TLS session.
To fix CVE-2011-1926, update Cyrus IMAP Server to version 2.4.6 or later, which addresses this vulnerability.
CVE-2011-1926 affects Cyrus IMAP Server versions 2.0.17 through 2.4.5.
Yes, CVE-2011-1926 can be exploited remotely by attackers inserting malicious commands during the TLS handshake.
The consequences of CVE-2011-1926 may include unauthorized execution of commands resulting in data leakage or additional system compromise.