7.5
CVSSv2

CVE-2005-2933

Published: 13/10/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote malicious users to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.

Vulnerable Product Search on Vulmon Subscribe to Product

university of washington uw-imap 2004d

university of washington uw-imap 2004e

university of washington uw-imap 2004

university of washington uw-imap 2004a

university of washington uw-imap 2004b

university of washington uw-imap 2004c

university of washington uw-imap

Vendor Advisories

Synopsis imap security update Type/Severity Security Advisory: Moderate Topic An updated imap package that fixes a buffer overflow issue is now availableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The imap package provides ...
Synopsis libc-client security update Type/Severity Security Advisory: Moderate Topic Updated libc-client packages that fix a buffer overflow issue are nowavailableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description C-client is a c ...
"infamous41md" discovered a buffer overflow in uw-imap, the University of Washington's IMAP Server that allows attackers to execute arbitrary code The old stable distribution (woody) is not affected by this problem For the stable distribution (sarge) this problem has been fixed in version 2002edebian1-11sarge1 For the unstable distribution (sid) ...

References

NVD-CWE-Otherhttp://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=truehttp://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.htmlhttp://www.washington.edu/imap/http://secunia.com/advisories/17062/http://www.debian.org/security/2005/dsa-861http://www.gentoo.org/security/en/glsa/glsa-200510-10.xmlhttp://www.kb.cert.org/vuls/id/933601http://www.mandriva.com/security/advisories?name=MDKSA-2005:189http://www.securityfocus.com/bid/15009http://www.redhat.com/support/errata/RHSA-2005-850.htmlhttp://secunia.com/advisories/17930http://securitytracker.com/id?1015000http://secunia.com/advisories/17148http://secunia.com/advisories/17152ftp://patches.sgi.com/support/free/security/advisories/20051201-01-Uhttp://secunia.com/advisories/18554http://secunia.com/advisories/17483http://secunia.com/advisories/17928http://secunia.com/advisories/17950http://www.redhat.com/support/errata/RHSA-2005-848.htmlhttp://www.novell.com/linux/security/advisories/2005_23_sr.htmlhttp://secunia.com/advisories/17215http://secunia.com/advisories/17276http://secunia.com/advisories/17336http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161http://rhn.redhat.com/errata/RHSA-2006-0276.htmlhttp://secunia.com/advisories/19832http://www.redhat.com/support/errata/RHSA-2006-0501.htmlhttp://secunia.com/advisories/20222http://support.avaya.com/elmodocs2/security/ASA-2006-129.htmhttp://secunia.com/advisories/20951http://secunia.com/advisories/21252http://support.avaya.com/elmodocs2/security/ASA-2006-160.htmhttp://secunia.com/advisories/21564http://rhn.redhat.com/errata/RHSA-2006-0549.htmlftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.aschttp://secunia.com/advisories/20210http://www.mandriva.com/security/advisories?name=MDKSA-2005:194http://securityreason.com/securityalert/47http://www.vupen.com/english/advisories/2006/2685https://exchange.xforce.ibmcloud.com/vulnerabilities/22518https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858http://www.securityfocus.com/archive/1/430303/100/0/threadedhttp://www.securityfocus.com/archive/1/430296/100/0/threadedhttps://access.redhat.com/errata/RHSA-2005:850https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/933601