UW-IMAP < 2007d.404 Multiple Utility Mailbox Name Overflow

high Nessus Network Monitor Plugin ID 4730

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

There is a flaw in the remote UW-IMAP server that allows a local user to execute arbitrary code on the server. The flaw is in the way that UW-IMAP handles malformed data sent to the 'tmail' and 'dmail' local executables. An attacker exploiting this flaw would need local access as well as the ability to execute the aforementioned binaries. Successful exploiation would result in the attacker executing arbitrary code as the 'root' user.

Solution

Upgrade to version 2007d.404 or higher.

See Also

http://www.washington.edu/imap

Plugin Details

Severity: High

ID: 4730

Family: IMAP Servers

Published: 11/3/2008

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.4

Temporal Score: 7.3

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:university_of_washington:imap_toolkit

Reference Information

CVE: CVE-2008-5005, CVE-2008-5006

BID: 32072, 32280