10
CVSSv2

CVE-2004-1067

Published: 10/01/2005 Updated: 11/07/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and previous versions leads to a buffer overflow, which may allow remote malicious users to execute arbitrary code via the username.

Vulnerable Product Search on Vulmon Subscribe to Product

carnegie mellon university cyrus imap server 2.2.6

carnegie mellon university cyrus imap server 2.1.10

carnegie mellon university cyrus imap server 2.2.8

carnegie mellon university cyrus imap server 2.2.9

carnegie mellon university cyrus imap server 2.2.0 alpha

carnegie mellon university cyrus imap server 2.0.16

carnegie mellon university cyrus imap server 1.5.19

carnegie mellon university cyrus imap server 2.1.9

carnegie mellon university cyrus imap server 2.2.5

carnegie mellon university cyrus imap server 2.2.2 beta

carnegie mellon university cyrus imap server 1.4

carnegie mellon university cyrus imap server 2.1.16

carnegie mellon university cyrus imap server 2.2.7

carnegie mellon university cyrus imap server 2.2.3

carnegie mellon university cyrus imap server 2.2.1 beta

carnegie mellon university cyrus imap server 2.1.7

carnegie mellon university cyrus imap server 2.2.4

carnegie mellon university cyrus imap server 2.0.12

redhat fedora core core 2.0

ubuntu ubuntu linux 4.1

redhat fedora core core 3.0

Vendor Advisories

Recently another buffer overflow has been discovered in the SASL authentication module of the Cyrus IMAP server An off-by-one comparison error in the mysasl_canon_user() function could lead to a missing termination of an user name string ...