Vulnerability Name: | CVE-2005-0546 (CCN-19454) | ||||||||||||
Assigned: | 2005-02-14 | ||||||||||||
Published: | 2005-02-14 | ||||||||||||
Updated: | 2018-10-19 | ||||||||||||
Summary: | Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. | ||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Cyrus Message 33613 archive.info-cyrus - 33613 Source: MLIST Type: Patch [info-cyrus] 20050214 Cyrus IMAPd 2.2.11 Released Source: CCN Type: Cyrus Software Download Web page Download Cyrus Software Source: CONFIRM Type: UNKNOWN http://bugs.gentoo.org/show_bug.cgi?id=82404 Source: MITRE Type: CNA CVE-2005-0546 Source: CONECTIVA Type: Vendor Advisory CLA-2005:937 Source: BUGTRAQ Type: UNKNOWN 20050228 [USN-87-1] Cyrus IMAP server vulnerability Source: CCN Type: RHSA-2005-408 cyrus-imapd security update Source: CCN Type: SA14383 Cyrus IMAP Server Buffer Overflow Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 14383 Source: GENTOO Type: Patch, Vendor Advisory GLSA-200502-29 Source: CCN Type: SECTRACK ID: 1013278 Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1013278 Source: CCN Type: GLSA-200502-29 Cyrus IMAP Server: Multiple overflow vulnerabilities Source: MANDRAKE Type: UNKNOWN MDKSA-2005:051 Source: CCN Type: OpenPKG-SA-2005.005 IMAPd Source: REDHAT Type: UNKNOWN RHSA-2005:408 Source: FEDORA Type: UNKNOWN FLSA:156290 Source: BID Type: UNKNOWN 12636 Source: CCN Type: BID-12636 Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities Source: CCN Type: USN-87-1 Cyrus IMAP server vulnerability Source: XF Type: UNKNOWN cyrus-imap-mailbox-bo(19454) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10674 Source: SUSE Type: SUSE-SA:2005:009 cyrus-imapd: buffer overflows | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: ![]() | ||||||||||||
Vulnerability Name: | CVE-2005-0546 (CCN-19455) | ||||||||||||
Assigned: | 2005-02-14 | ||||||||||||
Published: | 2005-02-14 | ||||||||||||
Updated: | 2005-02-24 | ||||||||||||
Summary: | Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Cyrus Message 33613 archive.info-cyrus - 33613 Source: CCN Type: Cyrus Software Download Web page Download Cyrus Software Source: MITRE Type: CNA CVE-2005-0546 Source: CCN Type: RHSA-2005-408 cyrus-imapd security update Source: CCN Type: SA14383 Cyrus IMAP Server Buffer Overflow Vulnerabilities Source: CCN Type: SECTRACK ID: 1013278 Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code Source: CCN Type: GLSA-200502-29 Cyrus IMAP Server: Multiple overflow vulnerabilities Source: CCN Type: OpenPKG-SA-2005.005 IMAPd Source: CCN Type: BID-12636 Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities Source: CCN Type: USN-87-1 Cyrus IMAP server vulnerability Source: XF Type: UNKNOWN cyrus-imap-extension-bo(19455) Source: SUSE Type: SUSE-SA:2005:009 cyrus-imapd: buffer overflows | ||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||
Vulnerability Name: | CVE-2005-0546 (CCN-19458) | ||||||||||||
Assigned: | 2005-02-14 | ||||||||||||
Published: | 2005-02-14 | ||||||||||||
Updated: | 2005-02-24 | ||||||||||||
Summary: | Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Cyrus Message 33613 archive.info-cyrus - 33613 Source: CCN Type: Cyrus Software Download Web page Download Cyrus Software Source: MITRE Type: CNA CVE-2005-0546 Source: CCN Type: RHSA-2005-408 cyrus-imapd security update Source: CCN Type: SA14383 Cyrus IMAP Server Buffer Overflow Vulnerabilities Source: CCN Type: SECTRACK ID: 1013278 Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code Source: CCN Type: GLSA-200502-29 Cyrus IMAP Server: Multiple overflow vulnerabilities Source: CCN Type: OpenPKG-SA-2005.005 IMAPd Source: CCN Type: BID-12636 Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities Source: CCN Type: USN-87-1 Cyrus IMAP server vulnerability Source: XF Type: UNKNOWN cyrus-imap-fetchnews-bo(19458) Source: SUSE Type: SUSE-SA:2005:009 cyrus-imapd: buffer overflows | ||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||
Vulnerability Name: | CVE-2005-0546 (CCN-19459) | ||||||||||||
Assigned: | 2005-02-14 | ||||||||||||
Published: | 2005-02-14 | ||||||||||||
Updated: | 2005-02-24 | ||||||||||||
Summary: | Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Cyrus Message 33613 archive.info-cyrus - 33613 Source: CCN Type: Cyrus Software Download Web page Download Cyrus Software Source: MITRE Type: CNA CVE-2005-0546 Source: CCN Type: RHSA-2005-408 cyrus-imapd security update Source: CCN Type: SA14383 Cyrus IMAP Server Buffer Overflow Vulnerabilities Source: CCN Type: SECTRACK ID: 1013278 Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code Source: CCN Type: GLSA-200502-29 Cyrus IMAP Server: Multiple overflow vulnerabilities Source: CCN Type: OpenPKG-SA-2005.005 IMAPd Source: CCN Type: BID-12636 Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities Source: CCN Type: USN-87-1 Cyrus IMAP server vulnerability Source: XF Type: UNKNOWN cyrus-imap-backend-bo(19459) Source: SUSE Type: SUSE-SA:2005:009 cyrus-imapd: buffer overflows | ||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||
Vulnerability Name: | CVE-2005-0546 (CCN-19460) | ||||||||||||
Assigned: | 2005-02-14 | ||||||||||||
Published: | 2005-02-14 | ||||||||||||
Updated: | 2018-10-19 | ||||||||||||
Summary: | Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd. | ||||||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Cyrus Message 33613 archive.info-cyrus - 33613 Source: CCN Type: Cyrus Software Download Web page Download Cyrus Software Source: MITRE Type: CNA CVE-2005-0546 Source: MITRE Type: CNA CVE-2005-2278 Source: CCN Type: RHSA-2005-408 cyrus-imapd security update Source: CCN Type: SA14383 Cyrus IMAP Server Buffer Overflow Vulnerabilities Source: CCN Type: SECTRACK ID: 1013278 Cyrus IMAPd Buffer Overflows in Annotate Extension, Cached Header, and Fetchnews May Let Remote Users Execute Arbitrary Code Source: CCN Type: GLSA-200502-29 Cyrus IMAP Server: Multiple overflow vulnerabilities Source: CCN Type: OpenPKG-SA-2005.005 IMAPd Source: CCN Type: BID-12636 Cyrus IMAPD Multiple Remote Buffer Overflow Vulnerabilities Source: CCN Type: USN-87-1 Cyrus IMAP server vulnerability Source: XF Type: UNKNOWN cyrus-imap-imapd-bo(19460) Source: SUSE Type: SUSE-SA:2005:009 cyrus-imapd: buffer overflows | ||||||||||||
Vulnerable Configuration: | Configuration RedHat 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |