Cyrus IMAP Server login Command Remote Overflow

High Nessus Network Monitor Plugin ID 1085

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

According to its banner, the remote Cyrus IMAP server is vulnerable to a pre-login buffer overrun. An attacker without a valid login could exploit this, and would be able to execute arbitrary commands as the owner of the Cyrus process. This would allow full access to all users' mailboxes. More information : http://online.securityfocus.com/archive/1/301864

Solution

If possible, upgrade to an unaffected version. However, at the time of writing no official fix was available. There is a source patch against 2.1.10 in the Bugtraq report.

See Also

http://archives.neohapsis.com/archives/bugtraq/2002-12/0014.html

Plugin Details

Severity: High

ID: 1085

File Name: 1085.prm

Family: IMAP Servers

Published: 2004/08/20

Modified: 2016/01/30

Nessus ID: 11196

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Reference Information

OSVDB: 55701