Cyrus IMAP Server login Command Remote Overflow

high Nessus Network Monitor Plugin ID 1085

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

According to its banner, the remote Cyrus IMAP server is vulnerable to a pre-login buffer overrun. An attacker without a valid login could exploit this, and would be able to execute arbitrary commands as the owner of the Cyrus process. This would allow full access to all users' mailboxes. More information : http://online.securityfocus.com/archive/1/301864

Solution

If possible, upgrade to an unaffected version. However, at the time of writing no official fix was available. There is a source patch against 2.1.10 in the Bugtraq report.

See Also

http://archives.neohapsis.com/archives/bugtraq/2002-12/0014.html

Plugin Details

Severity: High

ID: 1085

Family: IMAP Servers

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 11196

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C