Cyrus IMAPD < 2.2.12 Multiple Remote Overflows

high Nessus Network Monitor Plugin ID 2645

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

According to its banner, the remote Cyrus IMAPD server is vulnerable to multiple remote buffer overflow attacks. An attacker exploiting these flaws would need to be able to communicate with the IMAPD server (usually on TCP port 143). A successful attack would result in the attacker executing arbitrary code on the IMAPD server.

Solution

Upgrade to version 2.2.12 or higher.

See Also

http://cyrusimap.web.cmu.edu/imapd/changes.html

Plugin Details

Severity: High

ID: 2645

Family: IMAP Servers

Published: 2/24/2005

Updated: 3/6/2019

Nessus ID: 17208

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cyrus:imapd

Reference Information

CVE: CVE-2005-0546

BID: 12636