445
VMScore

CVE-2021-33582

Published: 01/09/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Cyrus IMAP prior to 3.4.2 allows remote malicious users to cause a denial of service (multiple-minute daemon hang) via input that is mishandled during hash-table interaction. Because there are many insertions into a single bucket, strcmp becomes slow. This is fixed in 3.4.2, 3.2.8, and 3.0.16.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cyrus imap

fedoraproject fedora 34

fedoraproject fedora 35

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #993433 cyrus-imapd: CVE-2021-33582 Package: src:cyrus-imapd; Maintainer for src:cyrus-imapd is Debian Cyrus Team <team+cyrus@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 1 Sep 2021 09:06:01 UTC Severity: important Tags: security, upstream Found in v ...
A flaw was found in cyrus-imapd A bad string hashing algorithm used in internal hash tables allows user inputs to be stored in predictable buckets A user may cause a CPU denial of service by maliciously directing many inputs to a single bucket The highest threat from this vulnerability is to system availability (CVE-2021-33582) ...
A flaw was found in cyrus-imapd A bad string hashing algorithm used in internal hash tables allows user inputs to be stored in predictable buckets A user may cause a CPU denial of service by maliciously directing many inputs to a single bucket The highest threat from this vulnerability is to system availability (CVE-2021-33582) ...