| VID |
18078 |
| Severity |
30 |
| Port |
143 |
| Protocol |
TCP |
| Class |
IMAP |
| Detailed Description |
The UW IMAP server, according to its banner, has a Remote Authentication Bypass vulnerability in the CRAM-MD5 authentication theme. UW IMAP (wu-imapd) is an Internet Message Access Protocol (IMAP) daemon developed by the University of Washington. UW IMAP versions prior to 2004b could allow a remote attacker to gain unauthorized access to any user's mailbox, caused by a logic error in the code that handles CRAM-MD5 (Challenge-Response Authentication Mechanism with MD5) incorrectly. As a result, If the CRAM-MD5 is enabled, which is not the default configuration, a remote attacker could authenticate as any user on the affected system and thereby read and delete email in the authorized user's account.
* Note: This check solely relied on the banner of the remote IMAP server to assess this vulnerability, so this might be a False Positive.
* References: http://www.washington.edu/imap/ http://www.kb.cert.org/vuls/id/702777 http://securityfocus.com/advisories/7981
* Platforms Affected: UW-IMAP versions prior to 2004b Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of UW-IMAP (2004b or later), available from the University of Washington FTP site at ftp://ftp.cac.washington.edu/imap/ |
| Related URL |
CVE-2005-0198 (CVE) |
| Related URL |
12391 (SecurityFocus) |
| Related URL |
19120 (ISS) |
|