Vulnerability Name:

CVE-2001-0691 (CCN-6269)

Assigned:2001-03-12
Published:2001-03-12
Updated:2008-09-05
Summary:Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-011.0
several buffer overflows in imap, ipop2d and ipop3d

Source: CCN
Type: SuSE Security Announcement SuSE-SA:2001:006
pop

Source: MITRE
Type: CNA
CVE-2001-0691

Source: CCN
Type: Conectiva Linux Announcement CLSA-2001:388
imap

Source: CCN
Type: RHSA-2001-094
Updated UW imap packages available (imap/pop3/imaps/pop3s)

Source: XF
Type: UNKNOWN
imap-ipop2d-ipop3d-bo(6269)

Source: CCN
Type: OSVDB ID: 12042
UoW imapd Multiple Unspecified Overflows

Source: REDHAT
Type: UNKNOWN
RHSA-2001:094

Source: MANDRAKE
Type: Patch, Vendor Advisory
MDKSA-2001:054

Source: BID
Type: Patch, Vendor Advisory
2856

Source: CCN
Type: BID-2856
Imapd Local Buffer Overflow Vulnerabilities

Source: XF
Type: UNKNOWN
imap-ipop2d-ipop3d-bo(6269)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:university_of_washington:imapd:2000:*:*:*:*:*:*:*
  • OR cpe:/a:university_of_washington:imapd:2000c:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:suse:suse_linux:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:connectiva:linux:-:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    university_of_washington imapd 2000
    university_of_washington imapd 2000c
    suse suse linux 6.1
    mandrakesoft mandrake linux 7.1
    mandrakesoft mandrake linux 7.2
    mandrakesoft mandrake linux corporate server 1.0.1
    mandrakesoft mandrake linux 8.0
    redhat linux 6.2
    connectiva linux -
    redhat linux 7.1