vendor:
Cyrus IMAPD
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Cyrus IMAPD
Affected Version From: 1.6.24
Affected Version To: 2.1.16
Patch Exists: YES
Related CWE: CVE-2002-0661
CPE: a:cyrusimap:cyrus_imapd
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix and Linux
2002
Cyrus IMAPD Buffer Overflow Vulnerability
Cyrus IMAPD does not sufficiently handle overly long strings. In some cases, when a user connects to the daemon, and upon negotiating the connection sends a login string of excessive length, a buffer overflow occurs. This could result in heap corruption and arbitrary words in memory being overwritten. It may be possible to exploit this issue to execute arbitrary code.
Mitigation:
Upgrade to the latest version of Cyrus IMAPD.