Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Cyrus IMAPD < 2.3.4 'POP3D USER' Command Remote Overflow



The remote host is vulnerable to a buffer overflow.


According to its banner, the remote Cyrus IMAPD server is vulnerable to a remote buffer overflow attack. The flaw is in the way that IMAPD handles malformed data sent with the 'POP3D USER' command. An attacker exploiting this flaw would need to be able to communicate with the IMAPD server (usually on TCP port 143). A successful attack would result in the attacker executing arbitrary code on the IMAPD server.


Upgrade to version 2.3.4 or higher.