Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> imap authenticate buffer overflow


Vulnerability Assessment Details

imap authenticate buffer overflow

Vulnerability Assessment Summary
checks for imap authenticate buffer overflow

Detailed Explanation for this Vulnerability Assessment

Summary :

It is possible to execute code on the remote IMAP server.

Description :

It was possible to crash the remote IMAP server by sending
a too long AUTHENTICATE command.
A possible hacker may be able to exploit this vulnerability to
execute code on the remote host.

Solution :

Contact your IMAP server vendor.

Network Security Threat Level:

Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID: 130

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Refurb Toshiba MK5061GSYB 500GB SATA/600 5400RPM 8MB 2.5 Hard Drive
$50.09
Refurb Toshiba MK5061GSYB 500GB SATA/600 5400RPM 8MB 2.5 Hard Drive pictureSamsung 840 EVO 1tb SSD
$65.0
Samsung 840 EVO 1tb SSD pictureRefurb Hitachi Ultrastar A7K1000 1 Terabyte (1TB) SATA/300 7200RPM 32MBHard Driv
$50.98
Refurb Hitachi Ultrastar A7K1000 1 Terabyte (1TB) SATA/300 7200RPM 32MBHard Driv pictureRefurb Western Digital Caviar Green 3 Terabyte (3TB) SATA/600 IntelliPower64MB H
$65.21
Refurb Western Digital Caviar Green 3 Terabyte (3TB) SATA/600 IntelliPower64MB H picture


Discussions

No Discussions have been posted on this vulnerability.