| VID |
18070 |
| Severity |
40 |
| Port |
143 |
| Protocol |
TCP |
| Class |
IMAP |
| Detailed Description |
The Cyrus IMAP server, according to its banner, has multiple buffer pre-authentication overflow vulnerabilities. Cyrus IMAPD is a freely available, open source Interactive Mail Access Protocol (IMAP) daemon for Unix and Linux operating systems. These vulnerabilities exists in the 'IMAPMAGICPLUS' support, the parser for the 'PARTIAL' command, and the parser for the 'FETCH' command, which allow remote, attacker-supplied machine code to be executed in the context of the affected server process. Cyrus-IMAPD is usually running as a non-privileged user.
* Note: This check solely relied on the banner of the remote Cyrus IMAP server to assess this vulnerability, so this might be a false positive.
* References: http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143
* Platforms Affected: Carnegie Mellon University, Cyrus IMAP Server 2.2.8 and earlier |
| Recommendation |
Upgrade to the latest version of Cyrus IMAPD (2.2.9 or later) from the Cyrus Download Web page at http://asg.web.cmu.edu/cyrus/download/ |
| Related URL |
CVE-2004-1011,CVE-2004-1012,CVE-2004-1013 (CVE) |
| Related URL |
11729 (SecurityFocus) |
| Related URL |
(ISS) |
|