Vulnerability Name:

CVE-2002-1580 (CCN-10744)

Assigned:2002-12-02
Published:2002-12-02
Updated:2017-07-11
Summary:Integer overflow in imapparse.c for Cyrus IMAP server 1.4 and 2.1.10 allows remote attackers to execute arbitrary code via a large length value that facilitates a buffer overflow attack, a different vulnerability than CVE-2002-1347.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Mon Dec 02 2002 - 11:56:06 CST
pre-login buffer overflow in Cyrus IMAP server

Source: CCN
Type: Carnegie Mellon University Web site
Project Cyrus

Source: CONFIRM
Type: UNKNOWN
http://asg.web.cmu.edu/cyrus/download/imapd/changes.html

Source: MITRE
Type: CNA
CVE-2002-1580

Source: CONECTIVA
Type: Vendor Advisory
CLA-2002:557

Source: CONECTIVA
Type: UNKNOWN
000557

Source: DEBIAN
Type: UNKNOWN
DSA-215

Source: DEBIAN
Type: DSA-215
cyrus-imapd -- buffer overflow

Source: CCN
Type: US-CERT VU#740169
Cyrus IMAP Server contains a buffer overflow vulnerability

Source: CERT-VN
Type: Patch, Third Party Advisory, US Government Resource
VU#740169

Source: CCN
Type: Gentoo Linux Security Announcement 200212-10
cyrus-sasl -- buffer overflows

Source: BUGTRAQ
Type: Exploit, Patch, Vendor Advisory
20021202 pre-login buffer overflow in Cyrus IMAP server

Source: BID
Type: Exploit, Patch, Vendor Advisory
6298

Source: CCN
Type: BID-6298
Cyrus IMAPD Pre-Login Heap Corruption Vulnerability

Source: XF
Type: UNKNOWN
cyrus-imap-preauth-bo(10744)

Source: XF
Type: UNKNOWN
cyrus-imap-preauth-bo(10744)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:carnegie_mellon_university:cyrus_imap_server:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:carnegie_mellon_university:cyrus_imap_server:1.5.19:*:*:*:*:*:*:*
  • OR cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:215
    V
    buffer overflow
    2002-12-23
    BACK
    carnegie_mellon_university cyrus imap server 1.4
    carnegie_mellon_university cyrus imap server 1.5.19
    carnegie_mellon_university cyrus imap server 2.0.12
    carnegie_mellon_university cyrus imap server 2.0.16
    carnegie_mellon_university cyrus imap server 2.1.9
    carnegie_mellon_university cyrus imap server 2.1.10
    carnegie_mellon_university cyrus imap server 2.1.10
    debian debian linux 2.2
    suse suse linux 7.1
    suse suse linux 7.2
    suse suse linux 7.3
    suse suse linux 8.0
    debian debian linux 3.0
    gentoo linux *
    suse suse linux 8.1