Vulnerability Name:
CVE-1999-0042 (CCN-96)
Assigned:
1997-03-02
Published:
1997-03-02
Updated:
2022-08-17
Summary:
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
CVSS v3 Severity:
10.0 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
10.0 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
10.0 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Access
References:
Source: CCN
Type: Caldera International, Inc. Security Advisory SA-1997.07
Vulnerability in imap
Source: CCN
Type: SGI Security Advisory 19980302-01-I
IMAP/POP Vulnerability
Source: CCN
Type: CIAC Information Bulletin H-46a
Vulnerability in IMAP and POP
Source: MITRE
Type: CNA
CVE-1999-0042
Source: CCN
Type: Network Associates, Inc. COVERT Labs Security Advisory #21, March 2, 1997
Buffer Overflow in imapd and ipop3d
Source: CCN
Type: CERT Advisory CA-1997-09
Vulnerability in IMAP and POP
Source: CCN
Type: OSVDB ID: 11731
UoW IMAP/POP server_login() Function Remote Overflow
Source: CCN
Type: University of Washington Web site
UW IMAP Information Center
Source: XF
Type: UNKNOWN
popimap-bo(96)
Source: MISC
Type: UNKNOWN
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042
Vulnerable Configuration:
Configuration 1
:
cpe:/a:university_of_washington:pop:3:*:*:*:*:*:*:*
OR
cpe:/a:university_of_washington:imap:4:*:*:*:*:*:*:*
Configuration 2
:
cpe:/o:ibm:aix:4.2.1:*:*:*:*:*:*:*
OR
cpe:/o:redhat:linux:2.0:*:*:*:*:*:*:*
OR
cpe:/o:caldera:openlinux:1.0:*:*:*:*:*:*:*
OR
cpe:/o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*
OR
cpe:/o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*
OR
cpe:/o:redhat:linux:4.0:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:ibm:aix:*:*:*:*:*:*:*:*
OR
cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:*:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:*:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
OR
cpe:/o:sun:solaris:*:*:*:*:*:*:*:*
OR
cpe:/o:ibm:os2:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_95:*:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_98:*:*:*:*:*:*:*:*
OR
cpe:/a:novell:netware:*:*:*:*:*:*:*:*
OR
cpe:/o:sco:unix:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
OR
cpe:/o:cisco:ios:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
OR
cpe:/o:compaq:tru64:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
OR
cpe:/o:caldera:openlinux:1.0:*:*:*:*:*:*:*
OR
cpe:/o:caldera:openlinux:1.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
university_of_washington
pop 3
university_of_washington
imap 4
ibm
aix 4.2.1
redhat
linux 2.0
caldera
openlinux 1.0
bsdi
bsd os 3.0
bsdi
bsd os 2.1
redhat
linux 4.0
ibm
aix *
windriver
bsdos *
hp
hp-ux *
sgi
irix *
linux
linux kernel *
sun
solaris *
ibm
os2 *
microsoft
windows 95 *
data_general
dg ux *
microsoft
windows nt 4.0
microsoft
windows 98 *
novell
netware *
sco
unix *
microsoft
windows 98se *
microsoft
windows 2000 *
cisco
ios *
microsoft
windows me *
compaq
tru64 *
microsoft
windows xp
caldera
openlinux 1.0
caldera
openlinux 1.1
apple
mac os *
microsoft
windows 2003_server