Korean
<< Back
VID 18078
Severity 30
Port 143
Protocol TCP
Class IMAP
Detailed Description The UW IMAP server, according to its banner, has a Remote Authentication Bypass vulnerability in the CRAM-MD5 authentication theme. UW IMAP (wu-imapd) is an Internet Message Access Protocol (IMAP) daemon developed by the University of Washington. UW IMAP versions prior to 2004b could allow a remote attacker to gain unauthorized access to any user's mailbox, caused by a logic error in the code that handles CRAM-MD5 (Challenge-Response Authentication Mechanism with MD5) incorrectly. As a result, If the CRAM-MD5 is enabled, which is not the default configuration, a remote attacker could authenticate as any user on the affected system and thereby read and delete email in the authorized user's account.

* Note: This check solely relied on the banner of the remote IMAP server to assess this vulnerability, so this might be a False Positive.

* References:
http://www.washington.edu/imap/
http://www.kb.cert.org/vuls/id/702777
http://securityfocus.com/advisories/7981

* Platforms Affected:
UW-IMAP versions prior to 2004b
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of UW-IMAP (2004b or later), available from the University of Washington FTP site at ftp://ftp.cac.washington.edu/imap/
Related URL CVE-2005-0198 (CVE)
Related URL 12391 (SecurityFocus)
Related URL 19120 (ISS)