Vulnerability Name: | CVE-2019-11356 (CCN-162147) | ||||||||||||||||||||
Assigned: | 2019-04-16 | ||||||||||||||||||||
Published: | 2019-04-16 | ||||||||||||||||||||
Updated: | 2022-05-03 | ||||||||||||||||||||
Summary: | The CalDAV feature in httpd in Cyrus IMAP 2.5.x through 2.5.12 and 3.0.x through 3.0.9 allows remote attackers to execute arbitrary code via a crafted HTTP PUT operation for an event with a long iCalendar property name. | ||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
4.9 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-787 CWE-119 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-11356 Source: REDHAT Type: Third Party Advisory RHSA-2019:1771 Source: XF Type: UNKNOWN cyrus-imap-cve201911356-code-exec(162147) Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-309f559057 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-f0435555ac Source: BUGTRAQ Type: Mailing List, Third Party Advisory 20190609 [SECURITY] [DSA 4458-1] cyrus-imapd security update Source: UBUNTU Type: Third Party Advisory USN-4566-1 Source: CCN Type: Cyrus IMAP Web site Cyrus IMAP 2.5 Releases Source: MISC Type: Release Notes, Vendor Advisory https://www.cyrusimap.org/imap/download/release-notes/2.5/index.html Source: MISC Type: Release Notes, Vendor Advisory https://www.cyrusimap.org/imap/download/release-notes/2.5/x/2.5.13.html Source: MISC Type: Release Notes, Vendor Advisory https://www.cyrusimap.org/imap/download/release-notes/3.0/index.html Source: MISC Type: Release Notes, Vendor Advisory https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.10.html Source: DEBIAN Type: Third Party Advisory DSA-4458 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |