UW-IMAP Mailbox Name Buffer Overflow

medium Nessus Plugin ID 19938

Synopsis

The remote IMAP server is prone to a buffer overflow.

Description

The remote host appears to be running a version of the University of Washington's IMAP daemon that is prone to a buffer overflow vulnerability involving long mailbox names that begin with a double-quote character. An authenticated attacker may be able to exploit this to execute arbitrary code subject to the privileges of the user.

Solution

Upgrade to UW IMAP imap-2004g or later.

See Also

http://www.nessus.org/u?b983aaaa

Plugin Details

Severity: Medium

ID: 19938

File Name: uw_imap_mailbox_overflow.nasl

Version: 1.16

Type: remote

Published: 10/6/2005

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

Required KB Items: imap/login, imap/password

Excluded KB Items: imap/false_imap, imap/overflow

Exploit Ease: No known exploits are available

Patch Publication Date: 12/13/2005

Vulnerability Publication Date: 10/4/2005

Reference Information

CVE: CVE-2005-2933

BID: 15009