CVE-2011-3208

Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
References
Link Resource
http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d Patch
http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd Patch
http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
http://secunia.com/advisories/45938 Vendor Advisory
http://secunia.com/advisories/45975 Vendor Advisory
http://secunia.com/advisories/46064 Vendor Advisory
http://securitytracker.com/id?1026031
http://www.debian.org/security/2011/dsa-2318
http://www.mandriva.com/security/advisories?name=MDVSA-2011:149
http://www.osvdb.org/75307
http://www.redhat.com/support/errata/RHSA-2011-1317.html
http://www.securityfocus.com/bid/49534
https://bugzilla.redhat.com/show_bug.cgi?id=734926 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
https://hermes.opensuse.org/messages/11723935
http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d Patch
http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd Patch
http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
http://secunia.com/advisories/45938 Vendor Advisory
http://secunia.com/advisories/45975 Vendor Advisory
http://secunia.com/advisories/46064 Vendor Advisory
http://securitytracker.com/id?1026031
http://www.debian.org/security/2011/dsa-2318
http://www.mandriva.com/security/advisories?name=MDVSA-2011:149
http://www.osvdb.org/75307
http://www.redhat.com/support/errata/RHSA-2011-1317.html
http://www.securityfocus.com/bid/49534
https://bugzilla.redhat.com/show_bug.cgi?id=734926 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
https://hermes.opensuse.org/messages/11723935
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cmu:cyrus_imap_server:*:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.1.17:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.1.18:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.12:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.13:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.13p1:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.2.14:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.12:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.13:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.14:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.3.15:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:cmu:cyrus_imap_server:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:cmu:cyrus_imap_server:2.4.10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199 - () http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199 -
References () http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200 - () http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200 -
References () http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d - Patch () http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d - Patch
References () http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd - Patch () http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd - Patch
References () http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html - () http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html -
References () http://secunia.com/advisories/45938 - Vendor Advisory () http://secunia.com/advisories/45938 - Vendor Advisory
References () http://secunia.com/advisories/45975 - Vendor Advisory () http://secunia.com/advisories/45975 - Vendor Advisory
References () http://secunia.com/advisories/46064 - Vendor Advisory () http://secunia.com/advisories/46064 - Vendor Advisory
References () http://securitytracker.com/id?1026031 - () http://securitytracker.com/id?1026031 -
References () http://www.debian.org/security/2011/dsa-2318 - () http://www.debian.org/security/2011/dsa-2318 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:149 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:149 -
References () http://www.osvdb.org/75307 - () http://www.osvdb.org/75307 -
References () http://www.redhat.com/support/errata/RHSA-2011-1317.html - () http://www.redhat.com/support/errata/RHSA-2011-1317.html -
References () http://www.securityfocus.com/bid/49534 - () http://www.securityfocus.com/bid/49534 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=734926 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=734926 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/69679 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/69679 -
References () https://hermes.opensuse.org/messages/11723935 - () https://hermes.opensuse.org/messages/11723935 -

Information

Published : 2011-09-14 17:17

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3208

Mitre link : CVE-2011-3208

CVE.ORG link : CVE-2011-3208


JSON object : View

Products Affected

cmu

  • cyrus_imap_server
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer