7.5
CVSSv2

CVE-2005-0546

Published: 02/05/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in Cyrus IMAPd prior to 2.2.11 may allow malicious users to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.

Vulnerable Product Search on Vulmon Subscribe to Product

cyrus imapd 2.0.17

cyrus imapd 2.1.16

cyrus imapd 2.1.17

cyrus imapd 2.1.18

cyrus imapd 2.2.10

Vendor Advisories

Synopsis cyrus-imapd security update Type/Severity Security Advisory: Moderate Topic Updated cyrus-imapd packages that fix several buffer overflow securityissues are now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Sean Larsson discovered a buffer overflow in the IMAP “annotate” extension This possibly allowed an authenticated IMAP client to execute arbitrary code with the privileges of the Cyrus IMAP server ...