The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 - | |
References | () http://asg.web.cmu.edu/cyrus/download/imapd/changes.html - | |
References | () http://marc.info/?l=bugtraq&m=110123023521619&w=2 - | |
References | () http://secunia.com/advisories/13274/ - | |
References | () http://security.e-matters.de/advisories/152004.html - | |
References | () http://security.gentoo.org/glsa/glsa-200411-34.xml - | |
References | () http://www.debian.org/security/2004/dsa-597 - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:139 - | |
References | () https://www.ubuntu.com/usn/usn-31-1/ - |
Information
Published : 2005-01-10 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1013
Mitre link : CVE-2004-1013
CVE.ORG link : CVE-2004-1013
JSON object : View
Products Affected
ubuntu
- ubuntu_linux
trustix
- secure_linux
conectiva
- linux
carnegie_mellon_university
- cyrus_imap_server
redhat
- fedora_core
openpkg
- openpkg
CWE