The CalDAV feature in httpd in Cyrus IMAP 2.5.x through 2.5.12 and 3.0.x through 3.0.9 allows remote attackers to execute arbitrary code via a crafted HTTP PUT operation for an event with a long iCalendar property name.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:1771 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGO43JS7IFDNITHXOOHOP6JHRKRDIYY6/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PICSZDC3UGEUZ27VXGGM6OFI67D3KKLZ/ | |
https://seclists.org/bugtraq/2019/Jun/9 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4566-1/ | Third Party Advisory |
https://www.cyrusimap.org/imap/download/release-notes/2.5/index.html | Release Notes Vendor Advisory |
https://www.cyrusimap.org/imap/download/release-notes/2.5/x/2.5.13.html | Release Notes Vendor Advisory |
https://www.cyrusimap.org/imap/download/release-notes/3.0/index.html | Release Notes Vendor Advisory |
https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.10.html | Release Notes Vendor Advisory |
https://www.debian.org/security/2019/dsa-4458 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
03 May 2022, 14:27
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGO43JS7IFDNITHXOOHOP6JHRKRDIYY6/ - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4566-1/ - Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PICSZDC3UGEUZ27VXGGM6OFI67D3KKLZ/ - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2019/dsa-4458 - Third Party Advisory | |
References | (BUGTRAQ) https://seclists.org/bugtraq/2019/Jun/9 - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1771 - Third Party Advisory |
Information
Published : 2019-06-03 20:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-11356
Mitre link : CVE-2019-11356
CVE.ORG link : CVE-2019-11356
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux_server_tus
- enterprise_linux_eus
- enterprise_linux_server_aus
- enterprise_linux
cyrus
- imap
canonical
- ubuntu_linux
fedoraproject
- fedora
CWE
CWE-787
Out-of-bounds Write