UW-IMAP Mailbox Name Buffer Overflow

This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.

Synopsis :

The remote IMAP server is prone to a buffer overflow.

Description :

The remote host appears to be running a version of the University of
Washington's IMAP daemon that is prone to a buffer overflow
vulnerability involving long mailbox names that begin with a
double-quote character. An authenticated attacker may be able to
exploit this to execute arbitrary code subject to the privileges of
the user.

See also :


Solution :

Upgrade to UW IMAP imap-2004g or later.

Risk factor :

Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : false

Family: Gain a shell remotely

Nessus Plugin ID: 19938 ()

Bugtraq ID: 15009

CVE ID: CVE-2005-2933

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now