ID |
CVE-2005-2933
|
Summary |
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
-
cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
-
cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
-
cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
-
cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
-
cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*
-
cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 19-10-2018 - 15:34) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
oval
via4
|
accepted | 2013-04-29T04:22:48.928-04:00 | class | vulnerability | contributors | name | Aharon Chernin | organization | SCAP.com, LLC |
name | Dragos Prisaca | organization | G2, Inc. |
| definition_extensions | comment | The operating system installed on the system is Red Hat Enterprise Linux 3 | oval | oval:org.mitre.oval:def:11782 |
comment | CentOS Linux 3.x | oval | oval:org.mitre.oval:def:16651 |
comment | The operating system installed on the system is Red Hat Enterprise Linux 4 | oval | oval:org.mitre.oval:def:11831 |
comment | CentOS Linux 4.x | oval | oval:org.mitre.oval:def:16636 |
comment | Oracle Linux 4.x | oval | oval:org.mitre.oval:def:15990 |
| description | Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely. | family | unix | id | oval:org.mitre.oval:def:9858 | status | accepted | submitted | 2010-07-09T03:56:16-04:00 | title | Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely. | version | 29 |
|
redhat
via4
|
advisories | | rpms | - libc-client-0:2002e-14
- libc-client-debuginfo-0:2002e-14
- libc-client-devel-0:2002e-14
- imap-1:2002d-12
- imap-debuginfo-1:2002d-12
- imap-devel-1:2002d-12
- imap-utils-1:2002d-12
- php-0:4.3.2-30.ent
- php-0:4.3.9-3.12
- php-debuginfo-0:4.3.2-30.ent
- php-debuginfo-0:4.3.9-3.12
- php-devel-0:4.3.2-30.ent
- php-devel-0:4.3.9-3.12
- php-domxml-0:4.3.9-3.12
- php-gd-0:4.3.9-3.12
- php-imap-0:4.3.2-30.ent
- php-imap-0:4.3.9-3.12
- php-ldap-0:4.3.2-30.ent
- php-ldap-0:4.3.9-3.12
- php-mbstring-0:4.3.9-3.12
- php-mysql-0:4.3.2-30.ent
- php-mysql-0:4.3.9-3.12
- php-ncurses-0:4.3.9-3.12
- php-odbc-0:4.3.2-30.ent
- php-odbc-0:4.3.9-3.12
- php-pear-0:4.3.9-3.12
- php-pgsql-0:4.3.2-30.ent
- php-pgsql-0:4.3.9-3.12
- php-snmp-0:4.3.9-3.12
- php-xmlrpc-0:4.3.9-3.12
|
|
refmap
via4
|
bid | 15009 | cert-vn | VU#933601 | confirm | | debian | DSA-861 | fedora | | fulldisc | 20051004 iDEFENSE Security Advisory 10.04.05: UW-IMAP Netmailbox Name Parsing Buffer Overflow Vulnerability | gentoo | GLSA-200510-10 | idefense | 20051004 UW-IMAP Netmailbox Name Parsing Buffer Overflow Vulnerability | mandriva | - MDKSA-2005:189
- MDKSA-2005:194
| sectrack | 1015000 | secunia | - 17062
- 17148
- 17152
- 17215
- 17276
- 17336
- 17483
- 17928
- 17930
- 17950
- 18554
- 19832
- 20210
- 20222
- 20951
- 21252
- 21564
| sgi | - 20051201-01-U
- 20060501-01-U
| slackware | SSA:2005-310-06 | sreason | 47 | suse | SUSE-SR:2005:023 | vupen | ADV-2006-2685 | xf | uw-imap-mailbox-name-bo(22518) |
|
Last major update |
19-10-2018 - 15:34 |
Published |
13-10-2005 - 22:02 |
Last modified |
19-10-2018 - 15:34 |