University of Washington imap Server (uw-imapd) BODY Request Remote Overflow

Medium Nessus Plugin ID 10966


It is possible to execute arbitrary code on the remote host, through the IMAP server.


The remote version of UW-IMAP is vulnerable to a buffer overflow condition that could allow an authenticated attacker to execute arbitrary code on the remote host with the privileges of the IMAP server.


Upgrade to imap-2001a.

Plugin Details

Severity: Medium

ID: 10966

File Name: imap_body_overflow.nasl

Version: $Revision: 1.21 $

Type: remote

Published: 2002/05/29

Modified: 2012/06/19

Dependencies: 10870, 17975

Risk Information

Risk Factor: Medium


Base Score: 6.5

Temporal Score: 5.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:university_of_washington:uw-imap:2000.283, cpe:/a:university_of_washington:uw-imap:2000.284, cpe:/a:university_of_washington:uw-imap:2000.287, cpe:/a:university_of_washington:uw-imap:2000.315

Excluded KB Items: imap/false_imap

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2002/05/10

Reference Information

CVE: CVE-2002-0379

BID: 4713

OSVDB: 790