Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> UW IMAP Mailbox Name Buffer Overflow


Vulnerability Assessment Details

UW IMAP Mailbox Name Buffer Overflow

Vulnerability Assessment Summary
Checks for mailbox name buffer overflow in in UW IMAP

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote IMAP server is prone to a buffer overflow.

Description :

The remote host appears to be running a version of the University of
Washington's IMAP daemon that is prone to a buffer overflow
vulnerability involving long mailbox names that begin with a
double-quote character. An authenticated attacker may be able to
exploit this to execute arbitrary code subject to the rights of
the user.

See also :

http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities

Solution :

Upgrade to UW IMAP imap-2004g or later.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:R/C:P/A:P/I:P/B:N)

Networks Security ID: 15009

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Vintage Atari 400 Home Computer KoalaPad Koala Pad Touch Table Model 004 - RARE
$17.99
Vintage Atari 400 Home Computer KoalaPad Koala Pad Touch Table Model 004 - RARE pictureBLUE'S CLUES PRESCHOOL (WIN/MAC) NEW SEALED RETAIL BOX - FREE U.S. SHIP - NICE
$11.71
BLUE'S CLUES PRESCHOOL (WIN/MAC) NEW SEALED RETAIL BOX - FREE U.S. SHIP - NICE pictureAtari 400 Box only
$25.0
Atari 400 Box only pictureTop Gunner Commodore 64 Microprose Game
$22.0
Top Gunner Commodore 64 Microprose Game picture


Discussions

No Discussions have been posted on this vulnerability.