The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 - | |
References | () http://asg.web.cmu.edu/cyrus/download/imapd/changes.html - | |
References | () http://marc.info/?l=bugtraq&m=110123023521619&w=2 - | |
References | () http://secunia.com/advisories/13274/ - | |
References | () http://security.e-matters.de/advisories/152004.html - | |
References | () http://security.gentoo.org/glsa/glsa-200411-34.xml - | |
References | () http://www.debian.org/security/2004/dsa-597 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18199 - | |
References | () https://www.ubuntu.com/usn/usn-31-1/ - |
Information
Published : 2005-01-10 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1012
Mitre link : CVE-2004-1012
CVE.ORG link : CVE-2004-1012
JSON object : View
Products Affected
ubuntu
- ubuntu_linux
trustix
- secure_linux
conectiva
- linux
carnegie_mellon_university
- cyrus_imap_server
redhat
- fedora_core
openpkg
- openpkg
CWE