| VID |
18061 |
| Severity |
40 |
| Port |
143 |
| Protocol |
TCP |
| Class |
IMAP |
| Detailed Description |
The IMAP server, according to its banner, appears to be the Courier-IMAP server. Courier-IMAP is an IMAP server that is included with the Courier Mail Server and can also be used as a standalone IMAP server for other mail servers. Courier-IMAP versions prior to 3.0.0 are vulnerable to a buffer overflow in the 'SHIFT_JIS' converter in 'shiftjis.c' and 'ISO2022JP' converter in 'so2022jp.c', which are a part of the Courier Japanese codeset. A remote attacker could exploit these vulnerabilities by supplying Unicode characters that exceed BMP (Basic Multilingual Plane) range. If successfully exploited, the attacker could execute arbitrary code on the affected system.
* Note: This check solely relied on the banner of the remote IMAP server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/11087/ http://sourceforge.net/project/shownotes.php?release_id=5767
* Platforms Affected: Sam Varshavchik: Courier-IMAP prior to 3.0.0 Linux Any version Unix Any version |
| Recommendation |
If the version of the relevant Courier-IMAP imap server is less than 3.0.0, upgrade to the latest version of Courier-IMAP (3.0.1 or later), available from the Courier Mail Server Web page at http://sourceforge.net/projects/courier/ |
| Related URL |
CVE-2004-0224 (CVE) |
| Related URL |
9845 (SecurityFocus) |
| Related URL |
15434 (ISS) |
|