UoW imapd AUTHENTICATE Command Remote Overflow

critical Nessus Plugin ID 10292

Synopsis

It is possible to execute code on the remote IMAP server.

Description

It was possible to crash the remote IMAP server by sending a too long AUTHENTICATE command.
An attacker may be able to exploit this vulnerability to execute code on the remote host.

Solution

Contact your IMAP server vendor.

Plugin Details

Severity: Critical

ID: 10292

File Name: uw_imap_overflow.nasl

Version: 1.31

Type: remote

Published: 6/22/1999

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Excluded KB Items: imap/false_imap

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 7/17/1998

Reference Information

CVE: CVE-1999-0005

BID: 130