CVE-2008-5005 : Détail

CVE-2008-5005

Overflow
6.19%V4
Network
2008-11-10
10h00 +00:00
2018-10-11
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Products Mentioned

Configuraton 0

University_of_washington>>Alpine >> Version 0.80

    University_of_washington>>Alpine >> Version 0.81

      University_of_washington>>Alpine >> Version 0.82

        University_of_washington>>Alpine >> Version 0.83

          University_of_washington>>Alpine >> Version 0.98

            University_of_washington>>Alpine >> Version 0.99

              University_of_washington>>Alpine >> Version 0.999

                University_of_washington>>Alpine >> Version 0.9999

                  University_of_washington>>Alpine >> Version 0.99999

                    University_of_washington>>Alpine >> Version 0.999999

                      University_of_washington>>Alpine >> Version 1.00

                        University_of_washington>>Alpine >> Version 1.10

                          University_of_washington>>Alpine >> Version 2.00

                            University_of_washington>>Imap_toolkit >> Version 2002

                              University_of_washington>>Imap_toolkit >> Version 2003

                                University_of_washington>>Imap_toolkit >> Version 2004

                                  University_of_washington>>Imap_toolkit >> Version 2005

                                    University_of_washington>>Imap_toolkit >> Version 2006

                                      University_of_washington>>Imap_toolkit >> Version 2007

                                        University_of_washington>>Imap_toolkit >> Version 2007c

                                          Références

                                          http://panda.com/imap/
                                          Tags : x_refsource_CONFIRM
                                          http://www.openwall.com/lists/oss-security/2008/11/03/3
                                          Tags : mailing-list, x_refsource_MLIST
                                          http://www.openwall.com/lists/oss-security/2008/11/03/5
                                          Tags : mailing-list, x_refsource_MLIST
                                          http://securityreason.com/securityalert/4570
                                          Tags : third-party-advisory, x_refsource_SREASON
                                          http://www.debian.org/security/2008/dsa-1685
                                          Tags : vendor-advisory, x_refsource_DEBIAN
                                          http://secunia.com/advisories/32483
                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                          http://www.securityfocus.com/bid/32072
                                          Tags : vdb-entry, x_refsource_BID
                                          http://secunia.com/advisories/33142
                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                          http://rhn.redhat.com/errata/RHSA-2009-0275.html
                                          Tags : vendor-advisory, x_refsource_REDHAT
                                          http://marc.info/?l=full-disclosure&m=122572590212610&w=4
                                          Tags : mailing-list, x_refsource_FULLDISC
                                          http://secunia.com/advisories/33996
                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                          http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
                                          Tags : vendor-advisory, x_refsource_MANDRIVA
                                          http://secunia.com/advisories/32512
                                          Tags : third-party-advisory, x_refsource_SECUNIA
                                          http://www.openwall.com/lists/oss-security/2008/11/03/4
                                          Tags : mailing-list, x_refsource_MLIST
                                          http://www.vupen.com/english/advisories/2008/3042
                                          Tags : vdb-entry, x_refsource_VUPEN
                                          http://securitytracker.com/id?1021131
                                          Tags : vdb-entry, x_refsource_SECTRACK