It was found that the Cyrus NNTP daemon (nntpd) did not properly verify that the user has successfully authenticated when checking if client requested NNTP commands can be performed. A remote NNTP client could use this flaw to bypass the authentication mechanism and obtain access to the information that should require authentication (list of newsgroups, newsgroup messages) or post new messages. Acknowledgement: Red Hat would like to thank Cyrus IMAP project for reporting this issue. Upstream acknowledges Stefan Cornelius of Secunia Research as the original reporter.
This issue affects the versions of the cyrus-imapd package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue affects the versions of the cyrus-imapd package, as shipped with Fedora release of 14 and 15.
Created attachment 524614 [details] Proposed Cyrus upstream patch to correct this issue against master branch
Created attachment 524615 [details] Proposed Cyrus upstream patch to correct this issue against v2.4 branch
Created attachment 524616 [details] Proposed Cyrus upstream patch to correct this issue against v2.3 branch
The CVE identifier of CVE-2011-3372 has been assigned to this issue.
This issue is now public: http://cyrusimap.org/mediawiki/index.php/Latest_Updates http://secunia.com/advisories/46093/
Upstream commit: http://git.cyrusimap.org/cyrus-imapd/commit/?id=77903669e04c9788460561dd0560b9c916519594 Fixed upstream in 2.3.18 and 2.4.12: http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=202 http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=203
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2011:1508 https://rhn.redhat.com/errata/RHSA-2011-1508.html