ID CVE-2006-2502
Summary Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
References
Vulnerable Configurations
  • cpe:2.3:a:cyrus:imapd:2.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:cyrus:imapd:2.3.2:*:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 20-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 18056
fulldisc 20060521 Cyrus IMAPD pop3d remote compromise aka cyrusFUCK3d
sectrack 1016131
vupen ADV-2006-1891
xf cyrus-imap-pop3d-bo(26578)
saint via4
  • bid 18056
    description Cyrus IMAP pop3d popsubfolders buffer overflow
    id mail_pop_cyruspopsub
    osvdb 25853
    title cyrus_imap_pop3d_subfolders_rh
    type remote
  • bid 18056
    description Cyrus IMAP pop3d popsubfolders buffer overflow
    id mail_pop_cyruspopsub
    osvdb 25853
    title cyrus_imap_pop3d_subfolders
    type remote
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement Not vulnerable. This issue does not affect the versions of cyrus-imapd distributed with Red Hat Enterprise Linux.
Last major update 20-07-2017 - 01:31
Published 22-05-2006 - 16:06
Last modified 20-07-2017 - 01:31
Back to Top