Language:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914632
https://security-tracker.debian.org/tracker/source-package/uw-imap
https://www.debian.org/lts/security/2021/dla-2866
Severity: High
ID: 156391
File Name: debian_DLA-2866.nasl
Version: 1.3
Type: local
Agent: unix
Family: Debian Local Security Checks
Published: 12/30/2021
Updated: 1/20/2022
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus
Risk Factor: High
Score: 8.4
Risk Factor: High
Base Score: 8.5
Temporal Score: 7
Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C
CVSS Score Source: CVE-2018-19518
Risk Factor: High
Base Score: 7.5
Temporal Score: 7
Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:debian:debian_linux:libc-client2007e, p-cpe:/a:debian:debian_linux:uw-mailutils, p-cpe:/a:debian:debian_linux:libc-client2007e-dev, cpe:/o:debian:debian_linux:9.0, p-cpe:/a:debian:debian_linux:mlock
Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/29/2021
Vulnerability Publication Date: 11/22/2018
Metasploit (php imap_open Remote Code Execution)
CVE: CVE-2018-19518