Cyrus IMAPD < 2.3.4 'POP3D USER' Command Remote Overflow

medium Nessus Network Monitor Plugin ID 3628

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

According to its banner, the remote Cyrus IMAPD server is vulnerable to a remote buffer overflow attack. The flaw is in the way that IMAPD handles malformed data sent with the 'POP3D USER' command. An attacker exploiting this flaw would need to be able to communicate with the IMAPD server (usually on TCP port 143). A successful attack would result in the attacker executing arbitrary code on the IMAPD server.

Solution

Upgrade to version 2.3.4 or higher.

See Also

http://asg.web.cmu.edu/cyrus

Plugin Details

Severity: Medium

ID: 3628

Family: IMAP Servers

Published: 5/22/2006

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:cyrus:imapd

Exploitable With

Metasploit (Cyrus IMAPD pop3d popsubfolders USER Buffer Overflow)

Reference Information

CVE: CVE-2006-2502

BID: 18056