This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote IMAP server is prone to a buffer overflow.
The remote host appears to be running a version of the University of
Washington's IMAP daemon that is prone to a buffer overflow
vulnerability involving long mailbox names that begin with a
double-quote character. An authenticated attacker may be able to
exploit this to execute arbitrary code subject to the privileges of
See also :
Upgrade to UW IMAP imap-2004g or later.
Risk factor :
Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : false