Korean
<< Back
VID 18061
Severity 40
Port 143
Protocol TCP
Class IMAP
Detailed Description The IMAP server, according to its banner, appears to be the Courier-IMAP server.
Courier-IMAP is an IMAP server that is included with the Courier Mail Server and can also be used as a standalone IMAP server for other mail servers. Courier-IMAP versions prior to 3.0.0 are vulnerable to a buffer overflow in the 'SHIFT_JIS' converter in 'shiftjis.c' and 'ISO2022JP' converter in 'so2022jp.c', which are a part of the Courier Japanese codeset. A remote attacker could exploit these vulnerabilities by supplying Unicode characters that exceed BMP (Basic Multilingual Plane) range. If successfully exploited, the attacker could execute arbitrary code on the affected system.

* Note: This check solely relied on the banner of the remote IMAP server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/11087/
http://sourceforge.net/project/shownotes.php?release_id=5767

* Platforms Affected:
Sam Varshavchik: Courier-IMAP prior to 3.0.0
Linux Any version
Unix Any version
Recommendation If the version of the relevant Courier-IMAP imap server is less than 3.0.0, upgrade to the latest version of Courier-IMAP (3.0.1 or later), available from the Courier Mail Server Web page at http://sourceforge.net/projects/courier/
Related URL CVE-2004-0224 (CVE)
Related URL 9845 (SecurityFocus)
Related URL 15434 (ISS)