Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and previous versions, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote malicious users to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
university of washington alpine 0.82 |
||
university of washington alpine 0.999999 |
||
university of washington alpine 0.98 |
||
university of washington alpine 1.00 |
||
university of washington alpine 1.10 |
||
university of washington alpine 0.99 |
||
university of washington alpine 0.81 |
||
university of washington imap toolkit 2003 |
||
university of washington imap toolkit 2005 |
||
university of washington imap toolkit 2002 |
||
university of washington alpine 2.00 |
||
university of washington imap toolkit 2007c |
||
university of washington alpine 0.80 |
||
university of washington alpine 0.99999 |
||
university of washington alpine 0.999 |
||
university of washington alpine 0.9999 |
||
university of washington imap toolkit 2006 |
||
university of washington imap toolkit 2004 |
||
university of washington imap toolkit 2007 |
||
university of washington alpine 0.83 |