Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain a shell remotely >> UW IMAP Mailbox Name Buffer Overflow


Vulnerability Assessment Details

UW IMAP Mailbox Name Buffer Overflow

Vulnerability Assessment Summary
Checks for mailbox name buffer overflow in in UW IMAP

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote IMAP server is prone to a buffer overflow.

Description :

The remote host appears to be running a version of the University of
Washington's IMAP daemon that is prone to a buffer overflow
vulnerability involving long mailbox names that begin with a
double-quote character. An authenticated attacker may be able to
exploit this to execute arbitrary code subject to the rights of
the user.

See also :

http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities

Solution :

Upgrade to UW IMAP imap-2004g or later.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:R/C:P/A:P/I:P/B:N)

Networks Security ID: 15009

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

Cisco Meraki MR26 Unclaimed Cloud Managed Wireless Access Point w/ Bracket Mount
$56.0
Cisco Meraki MR26 Unclaimed Cloud Managed Wireless Access Point w/ Bracket Mount pictureNEW Cisco High Speed Fan Tray for Catalyst 6506 WS-C6K-6SLOT-FAN2
$149.95
NEW Cisco High Speed Fan Tray for Catalyst 6506 WS-C6K-6SLOT-FAN2 pictureLot of 3 Cisco 8945 Unified Gigabit Video IP Phone with Camera - CP-8945
$169.99
Lot of 3 Cisco 8945 Unified Gigabit Video IP Phone with Camera - CP-8945 picture


Discussions

No Discussions have been posted on this vulnerability.