Outlook 2007
Patch description would seem to imply patch is fully backward compatible but it is not.
Jun 9 13:08:21 debsweb imaps[24533]: imapd:Loading hard-coded DH parameters
Jun 9 13:08:21 debsweb imaps[24533]: SSL_accept() incomplete → wait
Jun 9 13:08:21 debsweb imaps[24533]: EOF in SSL_accept() → fail
Jun 9 13:08:21 debsweb imaps[24533]: imaps TLS negotiation failed: gateway [XXXXXXX]
Jun 9 13:08:21 debsweb imaps[24533]: Fatal error: tls_start_servertls() failed
Jun 9 13:08:21 debsweb master[23853]: process 24533 exited, status 75
┌────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────┐
│Patch: slessp4-cyrus-imapd-12589 Kind: security Version: 1 ┬
│ ┴
│This update for cyrus-imapd fixes the following issues: - Previous versions of cyrus-imapd would not allow its users to │
│disable old SSL variants that are vulnerable to attacks like BEAST and POODLE. This patch adds the configuration option │
│’tls_versions’ to remedy that issue. Note that users who upgrade an existing installation will not have their │
│imapd.conf file overwritten, i.e. their IMAP server will continue to support SSLv2 and SSLv3 like before. To disable │
│support for those protocols, edit imapd.conf manually to include “tls_versions: tls1_0 tls1_1 tls1_2”. New │
│installations, however, will have an imapd.conf file that contains these settings already, i.e. newly installed IMAP │
│servers do not support unsafe versions of SSL unless that support is explicitly enabled by the user. (bsc#901748) - An┬
│integer overflow vulnerability in cyrus-imapd’s urlfetch range checking code was fixed. (CVE-2015-8076, CVE-2015-8077, ┴
│CVE-2015-8078, bsc#981670, bsc#954200, bsc#954201) - Support for Elliptic Curve DiffieÂHellman (ECDH) has been added to │
│cyrus-imapd. (bsc#860611) │
│References: │
│981670 (bugzilla): VUL-0: CVE-2015-8076: cyrus-imapd: urlfetch range handling flaw in Cyrus │
│901748 (bugzilla): VUL-1: CVE-2014-3566: cyrus-imap: POODLE: add patch to allow disabling of SSL │
│954200 (bugzilla): VUL-0: CVE-2015-8077: cyrus-imapd: Integer overflow in range checks ┬
│954201 (bugzilla): VUL-0: CVE-2015-8078: cyrus-imapd: Integer overflow in index_urlfetch ┴
│860611 (bugzilla): cyrus-imapd: enable ECDHE support │
│CVE-2015-8076 (cve): http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8076 │
│CVE-2015-8078 (cve): http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8078 │
│CVE-2014-3566 (cve): http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 ┬
│CVE-2015-8077 (cve): http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8077 ┴