Korean
<< Back
VID 18070
Severity 40
Port 143
Protocol TCP
Class IMAP
Detailed Description The Cyrus IMAP server, according to its banner, has multiple buffer pre-authentication overflow vulnerabilities.
Cyrus IMAPD is a freely available, open source Interactive Mail Access Protocol (IMAP) daemon for Unix and Linux operating systems. These vulnerabilities exists in the 'IMAPMAGICPLUS' support, the parser for the 'PARTIAL' command, and the parser for the 'FETCH' command, which allow remote, attacker-supplied machine code to be executed in the context of the affected server process. Cyrus-IMAPD is usually running as a non-privileged user.

* Note: This check solely relied on the banner of the remote Cyrus IMAP server to assess this vulnerability, so this might be a false positive.

* References:
http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143

* Platforms Affected:
Carnegie Mellon University, Cyrus IMAP Server 2.2.8 and earlier
Recommendation Upgrade to the latest version of Cyrus IMAPD (2.2.9 or later) from the Cyrus Download Web page at http://asg.web.cmu.edu/cyrus/download/
Related URL CVE-2004-1011,CVE-2004-1012,CVE-2004-1013 (CVE)
Related URL 11729 (SecurityFocus)
Related URL (ISS)