CVE-2005-2933

Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html Patch
http://rhn.redhat.com/errata/RHSA-2006-0276.html
http://rhn.redhat.com/errata/RHSA-2006-0549.html
http://secunia.com/advisories/17062/ Patch Vendor Advisory
http://secunia.com/advisories/17148
http://secunia.com/advisories/17152
http://secunia.com/advisories/17215
http://secunia.com/advisories/17276
http://secunia.com/advisories/17336
http://secunia.com/advisories/17483
http://secunia.com/advisories/17928
http://secunia.com/advisories/17930
http://secunia.com/advisories/17950
http://secunia.com/advisories/18554
http://secunia.com/advisories/19832
http://secunia.com/advisories/20210
http://secunia.com/advisories/20222
http://secunia.com/advisories/20951
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
http://securityreason.com/securityalert/47
http://securitytracker.com/id?1015000
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161
http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
http://www.debian.org/security/2005/dsa-861
http://www.gentoo.org/security/en/glsa/glsa-200510-10.xml
http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=true Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/933601 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2005:189
http://www.mandriva.com/security/advisories?name=MDKSA-2005:194
http://www.novell.com/linux/security/advisories/2005_23_sr.html
http://www.redhat.com/support/errata/RHSA-2005-848.html
http://www.redhat.com/support/errata/RHSA-2005-850.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
http://www.securityfocus.com/archive/1/430296/100/0/threaded
http://www.securityfocus.com/archive/1/430303/100/0/threaded
http://www.securityfocus.com/bid/15009
http://www.vupen.com/english/advisories/2006/2685
http://www.washington.edu/imap/ Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22518
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html Patch
http://rhn.redhat.com/errata/RHSA-2006-0276.html
http://rhn.redhat.com/errata/RHSA-2006-0549.html
http://secunia.com/advisories/17062/ Patch Vendor Advisory
http://secunia.com/advisories/17148
http://secunia.com/advisories/17152
http://secunia.com/advisories/17215
http://secunia.com/advisories/17276
http://secunia.com/advisories/17336
http://secunia.com/advisories/17483
http://secunia.com/advisories/17928
http://secunia.com/advisories/17930
http://secunia.com/advisories/17950
http://secunia.com/advisories/18554
http://secunia.com/advisories/19832
http://secunia.com/advisories/20210
http://secunia.com/advisories/20222
http://secunia.com/advisories/20951
http://secunia.com/advisories/21252
http://secunia.com/advisories/21564
http://securityreason.com/securityalert/47
http://securitytracker.com/id?1015000
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161
http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm
http://www.debian.org/security/2005/dsa-861
http://www.gentoo.org/security/en/glsa/glsa-200510-10.xml
http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=true Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/933601 US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2005:189
http://www.mandriva.com/security/advisories?name=MDKSA-2005:194
http://www.novell.com/linux/security/advisories/2005_23_sr.html
http://www.redhat.com/support/errata/RHSA-2005-848.html
http://www.redhat.com/support/errata/RHSA-2005-850.html
http://www.redhat.com/support/errata/RHSA-2006-0501.html
http://www.securityfocus.com/archive/1/430296/100/0/threaded
http://www.securityfocus.com/archive/1/430303/100/0/threaded
http://www.securityfocus.com/bid/15009
http://www.vupen.com/english/advisories/2006/2685
http://www.washington.edu/imap/ Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/22518
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U - () ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U -
References () ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc - () ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc -
References () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html - Patch () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0081.html - Patch
References () http://rhn.redhat.com/errata/RHSA-2006-0276.html - () http://rhn.redhat.com/errata/RHSA-2006-0276.html -
References () http://rhn.redhat.com/errata/RHSA-2006-0549.html - () http://rhn.redhat.com/errata/RHSA-2006-0549.html -
References () http://secunia.com/advisories/17062/ - Patch, Vendor Advisory () http://secunia.com/advisories/17062/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/17148 - () http://secunia.com/advisories/17148 -
References () http://secunia.com/advisories/17152 - () http://secunia.com/advisories/17152 -
References () http://secunia.com/advisories/17215 - () http://secunia.com/advisories/17215 -
References () http://secunia.com/advisories/17276 - () http://secunia.com/advisories/17276 -
References () http://secunia.com/advisories/17336 - () http://secunia.com/advisories/17336 -
References () http://secunia.com/advisories/17483 - () http://secunia.com/advisories/17483 -
References () http://secunia.com/advisories/17928 - () http://secunia.com/advisories/17928 -
References () http://secunia.com/advisories/17930 - () http://secunia.com/advisories/17930 -
References () http://secunia.com/advisories/17950 - () http://secunia.com/advisories/17950 -
References () http://secunia.com/advisories/18554 - () http://secunia.com/advisories/18554 -
References () http://secunia.com/advisories/19832 - () http://secunia.com/advisories/19832 -
References () http://secunia.com/advisories/20210 - () http://secunia.com/advisories/20210 -
References () http://secunia.com/advisories/20222 - () http://secunia.com/advisories/20222 -
References () http://secunia.com/advisories/20951 - () http://secunia.com/advisories/20951 -
References () http://secunia.com/advisories/21252 - () http://secunia.com/advisories/21252 -
References () http://secunia.com/advisories/21564 - () http://secunia.com/advisories/21564 -
References () http://securityreason.com/securityalert/47 - () http://securityreason.com/securityalert/47 -
References () http://securitytracker.com/id?1015000 - () http://securitytracker.com/id?1015000 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.500161 -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm -
References () http://www.debian.org/security/2005/dsa-861 - () http://www.debian.org/security/2005/dsa-861 -
References () http://www.gentoo.org/security/en/glsa/glsa-200510-10.xml - () http://www.gentoo.org/security/en/glsa/glsa-200510-10.xml -
References () http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=true - Patch, Vendor Advisory () http://www.idefense.com/application/poi/display?id=313&type=vulnerabilities&flashstatus=true - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/933601 - US Government Resource () http://www.kb.cert.org/vuls/id/933601 - US Government Resource
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:189 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:189 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:194 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:194 -
References () http://www.novell.com/linux/security/advisories/2005_23_sr.html - () http://www.novell.com/linux/security/advisories/2005_23_sr.html -
References () http://www.redhat.com/support/errata/RHSA-2005-848.html - () http://www.redhat.com/support/errata/RHSA-2005-848.html -
References () http://www.redhat.com/support/errata/RHSA-2005-850.html - () http://www.redhat.com/support/errata/RHSA-2005-850.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0501.html - () http://www.redhat.com/support/errata/RHSA-2006-0501.html -
References () http://www.securityfocus.com/archive/1/430296/100/0/threaded - () http://www.securityfocus.com/archive/1/430296/100/0/threaded -
References () http://www.securityfocus.com/archive/1/430303/100/0/threaded - () http://www.securityfocus.com/archive/1/430303/100/0/threaded -
References () http://www.securityfocus.com/bid/15009 - () http://www.securityfocus.com/bid/15009 -
References () http://www.vupen.com/english/advisories/2006/2685 - () http://www.vupen.com/english/advisories/2006/2685 -
References () http://www.washington.edu/imap/ - Patch () http://www.washington.edu/imap/ - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22518 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22518 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9858 -

Information

Published : 2005-10-13 22:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2933

Mitre link : CVE-2005-2933

CVE.ORG link : CVE-2005-2933


JSON object : View

Products Affected

university_of_washington

  • uw-imap