ID |
CVE-2006-2502
|
Summary |
Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 5.1 (as of 20-07-2017 - 01:31) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
HIGH |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:H/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bid | 18056 | fulldisc | 20060521 Cyrus IMAPD pop3d remote compromise aka cyrusFUCK3d | sectrack | 1016131 | vupen | ADV-2006-1891 | xf | cyrus-imap-pop3d-bo(26578) |
|
saint
via4
|
bid | 18056 | description | Cyrus IMAP pop3d popsubfolders buffer overflow | id | mail_pop_cyruspopsub | osvdb | 25853 | title | cyrus_imap_pop3d_subfolders_rh | type | remote |
bid | 18056 | description | Cyrus IMAP pop3d popsubfolders buffer overflow | id | mail_pop_cyruspopsub | osvdb | 25853 | title | cyrus_imap_pop3d_subfolders | type | remote |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2006-08-30 | organization | Red Hat | statement | Not vulnerable. This issue does not affect the versions of cyrus-imapd distributed with Red Hat Enterprise Linux. |
|
Last major update |
20-07-2017 - 01:31 |
Published |
22-05-2006 - 16:06 |
Last modified |
20-07-2017 - 01:31 |