From:	 dburcaw@newhope.terraplex.com
To:	 yellowdog-updates@lists.yellowdoglinux.com
Subject: [yellowdog-updates] Yellow Dog Linux Security Advisory: YDU-20010725-15
Date:	 9 Aug 2001 23:32:57 -0000

Yellow Dog Linux Security Announcement
--------------------------------------

Package:	imap	
Issue Date: 	July 25, 2001
Priority:	high		
Advisory ID: 	YDU-20010725-15


1. 	Topic:

	Updated imap packages are available which fix
	several buffer overflow vulnerabilities found
	in the version that shipped with YDL 2.0.


2. 	Problem:

	"Several buffer overflow vulnerabilities have been found by both the
	authors of UW imap and others.  The vulnerabilities are only
	exploitable after a user has authenticated with the server, giving
	a remote shell restricted to the permissions of the authenticated
	user.

	Impact:  Systems that already allow users remote shell access are
	not affected by the buffer overflow vulnerabilities; however, it is
	highly recommended that all systems be upgraded to this release,
	as it fixes other server crabugs as well.

	In addition, imap server crashing problems related to messages
	containing null characters in the message body have been fixed in
	this release."
	(from Red Hat's security advisory)


3. 	Solution:

   	a) Updating via yup...
   	We suggest that you use the Yellow Dog Update Program (yup)
   	to keep your system up-to-date. The following command(s) will
   	automatically retrieve and install the fixed version of
   	this update onto your system:

   		yup update imap 
		yup update imap-devel

   	b) Updating manually...
   	The update can also be retrieved manually from our ftp site
   	below along with the rpm command that should be used to install
   	the update.  (Please use a mirror site)

   		ftp://ftp.yellowdoglinux.com/pub/yellowdog/updates/yellowdog-2.0/ppc/RPMS/
		rpm -Fvh imap-2000c-10.ppc.rpm
		rpm -Fvh imap-devel-2000c-10.ppc.rpm


4. Verification

MD5 checksum			  Package
--------------------------------  ----------------------------
cb1b1f615ebe5778c2a765afb3526e0d  SRPMS/imap-2000c-10.src.rpm
c3fa7f589efab6a5af948f109cccc81b  ppc/RPMS/imap-2000c-10.ppc.rpm
c8db0750f9fb99cc5b9ea83ae82450ca  ppc/RPMS/imap-devel-2000c-10.ppc.rpm

If you wish to verify that each package has not been corrupted or tampered with,
examine the md5sum with the following command: rpm --checksig --nogpg filename


5. Misc.

Terra Soft has setup a moderated mailing list where these security, bugfix, and package
enhancement announcements will be posted. See http://lists.yellowdoglinux.com/ for more
information.

For information regarding the usage of yup, the Yellow Dog Update Program, see 
http://devel.yellowdoglinux.com/rp_yup.shtml