Vulnerability Name:

CVE-2005-0546 (CCN-19454)

Assigned:2005-02-14
Published:2005-02-14
Updated:2018-10-19
Summary:Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Cyrus Message 33613
archive.info-cyrus - 33613

Source: MLIST
Type: Patch
[info-cyrus] 20050214 Cyrus IMAPd 2.2.11 Released

Source: CCN
Type: Cyrus Software Download Web page
Download Cyrus Software

Source: CONFIRM
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=82404

Source: MITRE
Type: CNA
CVE-2005-0546

Source: CONECTIVA
Type: Vendor Advisory
CLA-2005:937

Source: BUGTRAQ
Type: UNKNOWN
20050228 [USN-87-1] Cyrus IMAP server vulnerability

Source: CCN
Type: RHSA-2005-408
cyrus-imapd security update

Source: CCN
Type: SA14383
Cyrus IMAP Server Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: Patch, Vendor Advisory
14383

Source: GENTOO
Type: Patch, Vendor Advisory
GLSA-200502-29

Source: CCN
Type: SECTRACK ID: 1013278
Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1013278

Source: CCN
Type: GLSA-200502-29
Cyrus IMAP Server: Multiple overflow vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2005:051

Source: CCN
Type: OpenPKG-SA-2005.005
IMAPd

Source: REDHAT
Type: UNKNOWN
RHSA-2005:408

Source: FEDORA
Type: UNKNOWN
FLSA:156290

Source: BID
Type: UNKNOWN
12636

Source: CCN
Type: BID-12636
Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities

Source: CCN
Type: USN-87-1
Cyrus IMAP server vulnerability

Source: XF
Type: UNKNOWN
cyrus-imap-mailbox-bo(19454)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10674

Source: SUSE
Type: SUSE-SA:2005:009
cyrus-imapd: buffer overflows

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cyrus:imapd:2.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:cyrus:imapd:2.1.16:*:*:*:*:*:*:*
  • OR cpe:/a:cyrus:imapd:2.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:cyrus:imapd:2.1.18:*:*:*:*:*:*:*
  • OR cpe:/a:cyrus:imapd:2.2.10:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-0546 (CCN-19455)

    Assigned:2005-02-14
    Published:2005-02-14
    Updated:2005-02-24
    Summary:Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
    CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): Single_Instance
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: Cyrus Message 33613
    archive.info-cyrus - 33613

    Source: CCN
    Type: Cyrus Software Download Web page
    Download Cyrus Software

    Source: MITRE
    Type: CNA
    CVE-2005-0546

    Source: CCN
    Type: RHSA-2005-408
    cyrus-imapd security update

    Source: CCN
    Type: SA14383
    Cyrus IMAP Server Buffer Overflow Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1013278
    Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: GLSA-200502-29
    Cyrus IMAP Server: Multiple overflow vulnerabilities

    Source: CCN
    Type: OpenPKG-SA-2005.005
    IMAPd

    Source: CCN
    Type: BID-12636
    Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities

    Source: CCN
    Type: USN-87-1
    Cyrus IMAP server vulnerability

    Source: XF
    Type: UNKNOWN
    cyrus-imap-extension-bo(19455)

    Source: SUSE
    Type: SUSE-SA:2005:009
    cyrus-imapd: buffer overflows

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-0546 (CCN-19458)

    Assigned:2005-02-14
    Published:2005-02-14
    Updated:2005-02-24
    Summary:Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
    CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: Cyrus Message 33613
    archive.info-cyrus - 33613

    Source: CCN
    Type: Cyrus Software Download Web page
    Download Cyrus Software

    Source: MITRE
    Type: CNA
    CVE-2005-0546

    Source: CCN
    Type: RHSA-2005-408
    cyrus-imapd security update

    Source: CCN
    Type: SA14383
    Cyrus IMAP Server Buffer Overflow Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1013278
    Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: GLSA-200502-29
    Cyrus IMAP Server: Multiple overflow vulnerabilities

    Source: CCN
    Type: OpenPKG-SA-2005.005
    IMAPd

    Source: CCN
    Type: BID-12636
    Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities

    Source: CCN
    Type: USN-87-1
    Cyrus IMAP server vulnerability

    Source: XF
    Type: UNKNOWN
    cyrus-imap-fetchnews-bo(19458)

    Source: SUSE
    Type: SUSE-SA:2005:009
    cyrus-imapd: buffer overflows

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-0546 (CCN-19459)

    Assigned:2005-02-14
    Published:2005-02-14
    Updated:2005-02-24
    Summary:Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
    CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): Single_Instance
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: Cyrus Message 33613
    archive.info-cyrus - 33613

    Source: CCN
    Type: Cyrus Software Download Web page
    Download Cyrus Software

    Source: MITRE
    Type: CNA
    CVE-2005-0546

    Source: CCN
    Type: RHSA-2005-408
    cyrus-imapd security update

    Source: CCN
    Type: SA14383
    Cyrus IMAP Server Buffer Overflow Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1013278
    Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: GLSA-200502-29
    Cyrus IMAP Server: Multiple overflow vulnerabilities

    Source: CCN
    Type: OpenPKG-SA-2005.005
    IMAPd

    Source: CCN
    Type: BID-12636
    Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities

    Source: CCN
    Type: USN-87-1
    Cyrus IMAP server vulnerability

    Source: XF
    Type: UNKNOWN
    cyrus-imap-backend-bo(19459)

    Source: SUSE
    Type: SUSE-SA:2005:009
    cyrus-imapd: buffer overflows

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-0546 (CCN-19460)

    Assigned:2005-02-14
    Published:2005-02-14
    Updated:2018-10-19
    Summary:Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
    CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Local
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Partial
    Integrity (I): Partial
    Availibility (A): Partial
    7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Exploitability Metrics:Access Vector (AV): Local
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): Complete
    Integrity (I): Complete
    Availibility (A): Complete
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: Cyrus Message 33613
    archive.info-cyrus - 33613

    Source: CCN
    Type: Cyrus Software Download Web page
    Download Cyrus Software

    Source: MITRE
    Type: CNA
    CVE-2005-0546

    Source: MITRE
    Type: CNA
    CVE-2005-2278

    Source: CCN
    Type: RHSA-2005-408
    cyrus-imapd security update

    Source: CCN
    Type: SA14383
    Cyrus IMAP Server Buffer Overflow Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1013278
    Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: GLSA-200502-29
    Cyrus IMAP Server: Multiple overflow vulnerabilities

    Source: CCN
    Type: OpenPKG-SA-2005.005
    IMAPd

    Source: CCN
    Type: BID-12636
    Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities

    Source: CCN
    Type: USN-87-1
    Cyrus IMAP server vulnerability

    Source: XF
    Type: UNKNOWN
    cyrus-imap-imapd-bo(19460)

    Source: SUSE
    Type: SUSE-SA:2005:009
    cyrus-imapd: buffer overflows

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:10674
    V
    Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
    2013-04-29
    oval:com.redhat.rhsa:def:20050408
    P
    RHSA-2005:408: cyrus-imapd security update (Moderate)
    2005-05-17
    BACK
    cyrus imapd 2.0.17
    cyrus imapd 2.1.16
    cyrus imapd 2.1.17
    cyrus imapd 2.1.18
    cyrus imapd 2.2.10