TITLE: Mandriva update for php-imap SECUNIA ADVISORY ID: SA17336 VERIFY ADVISORY: http://secunia.com/advisories/17336/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandrake Corporate Server 2.x http://secunia.com/product/1222/ Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for php-imap. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system. For more information: SA17062 SOLUTION: Apply updated packages. Mandrakelinux 10.1: 959a1497572aa4f2871b6d2650795883 10.1/RPMS/php-imap-4.3.8-1.1.101mdk.i586.rpm b41e8d05335694fa522c403c96ca3987 10.1/SRPMS/php-imap-4.3.8-1.1.101mdk.src.rpm Mandrakelinux 10.1/X86_64: ebe83f9574925da13ddd1f4b75688fa8 x86_64/10.1/RPMS/php-imap-4.3.8-1.1.101mdk.x86_64.rpm b41e8d05335694fa522c403c96ca3987 x86_64/10.1/SRPMS/php-imap-4.3.8-1.1.101mdk.src.rpm Corporate Server 2.1: 9be9a883ded639585446c6d5de663421 corporate/2.1/RPMS/php-imap-4.2.3-1.1.C21mdk.i586.rpm 4ac16712b0354cd3a3a900a531d18f75 corporate/2.1/SRPMS/php-imap-4.2.3-1.1.C21mdk.src.rpm Corporate Server 2.1/X86_64: 03a4ef56e03fc2ca25a3234af2f3da17 x86_64/corporate/2.1/RPMS/php-imap-4.2.3-1.1.C21mdk.x86_64.rpm 4ac16712b0354cd3a3a900a531d18f75 x86_64/corporate/2.1/SRPMS/php-imap-4.2.3-1.1.C21mdk.src.rpm ORIGINAL ADVISORY: http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:194 OTHER REFERENCES: SA17062: http://secunia.com/advisories/17062/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------