Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> Courier IMAP remote overflows


Vulnerability Assessment Details

Courier IMAP remote overflows

Vulnerability Assessment Summary
Checks the version number

Detailed Explanation for this Vulnerability Assessment

The remote mail server is the Courier-IMAP imap server.

There is a buffer overflow in the conversions functions of this software
which may permit a possible hacker to execute arbitrary code on this host.

Solution : Upgrade to Courier-Imap 3.0.0 or newer
Network Security Threat Level: High

Networks Security ID: 9845, 10976

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 Tenable Network Security

Cables, Connectors

Intel Xeon E5-1660 v2 SR1AP 3.7GHz 15MB 6-Core LGA2011 CPU Processor
$190.0
Intel Xeon E5-1660 v2 SR1AP 3.7GHz 15MB 6-Core LGA2011 CPU Processor pictureIntel XeonE5-2637 V2 SR1B7 3.5GHZ 15MB FC LGA2011 CPU Processors
$62.0
Intel XeonE5-2637 V2 SR1B7 3.5GHZ 15MB FC LGA2011 CPU Processors pictureIntel Xeon E7-8880V2 37.5MB FCLGA2011 15 Cores 30 Threads CPU Processor
$78.67
Intel Xeon E7-8880V2 37.5MB FCLGA2011 15 Cores 30 Threads CPU Processor pictureNew Supermicro System SYS-7038A-I Mid-Tower Xeon E5-2600 v3 LGA2011 Socket R3 4x
$918.28
New Supermicro System SYS-7038A-I Mid-Tower Xeon E5-2600 v3 LGA2011 Socket R3 4x picture


Discussions

No Discussions have been posted on this vulnerability.