7.5
CVSSv2

CVE-2002-1580

Published: 14/06/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in imapparse.c for Cyrus IMAP server 1.4 and 2.1.10 allows remote malicious users to execute arbitrary code via a large length value that facilitates a buffer overflow attack, a different vulnerability than CVE-2002-1347.

Vulnerable Product Search on Vulmon Subscribe to Product

carnegie mellon university cyrus imap server 2.0.12

carnegie mellon university cyrus imap server 2.0.16

carnegie mellon university cyrus imap server 2.1.10

carnegie mellon university cyrus imap server 2.1.9

carnegie mellon university cyrus imap server 1.4

carnegie mellon university cyrus imap server 1.5.19

Vendor Advisories

Timo Sirainen discovered a buffer overflow in the Cyrus IMAP server, which could be exploited by a remote attacker prior to logging in A malicious user could craft a request to run commands on the server under the UID and GID of the cyrus server For the current stable distribution (woody) this problem has been fixed in version 1519-91 For the ...

Exploits

source: wwwsecurityfocuscom/bid/6298/info Cyrus IMAPD is a freely available, open source Interactive Mail Access Protocol (IMAP) daemon It is available for Unix and Linux operating systems It has been reported that Cyrus IMAPD does not sufficiently handle overly long strings In some cases, when a user connects to the daemon, and upon ...