Vulnerability Description
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| University Of Washington | Uw-Imap | <= 2004f |
References
- ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
- ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
- http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.htmlPatch
- http://rhn.redhat.com/errata/RHSA-2006-0276.html
- http://rhn.redhat.com/errata/RHSA-2006-0549.html
- http://secunia.com/advisories/17062/PatchVendor Advisory
- http://secunia.com/advisories/17148
- http://secunia.com/advisories/17152
- http://secunia.com/advisories/17215
- http://secunia.com/advisories/17276
- http://secunia.com/advisories/17336
- http://secunia.com/advisories/17483
- http://secunia.com/advisories/17928
- http://secunia.com/advisories/17930
- http://secunia.com/advisories/17950
FAQ
What is CVE-2005-2933?
CVE-2005-2933 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name contai...
How severe is CVE-2005-2933?
CVE-2005-2933 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2933?
Check the references section above for vendor advisories and patch information. Affected products include: University Of Washington Uw-Imap.