Lucene search

K
cve[email protected]CVE-2006-5973
HistoryNov 20, 2006 - 7:07 p.m.

CVE-2006-5973

2006-11-2019:07:00
web.nvd.nist.gov
30
cve-2006-5973
buffer overflow
dovecot
denial of service
nvd
imap
pop3
security vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

AI Score

Confidence

Low

0.152 Low

EPSS

Percentile

95.9%

Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to “yes,” allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.

Affected configurations

NVD
Node
timo_sirainendovecotMatch1.0
OR
timo_sirainendovecotMatch1.0.alpha1
OR
timo_sirainendovecotMatch1.0.alpha2
OR
timo_sirainendovecotMatch1.0.alpha3
OR
timo_sirainendovecotMatch1.0.alpha4
OR
timo_sirainendovecotMatch1.0.alpha5
OR
timo_sirainendovecotMatch1.0.beta1
OR
timo_sirainendovecotMatch1.0.beta2
OR
timo_sirainendovecotMatch1.0.beta3
OR
timo_sirainendovecotMatch1.0.beta4
OR
timo_sirainendovecotMatch1.0.beta5
OR
timo_sirainendovecotMatch1.0.beta6
OR
timo_sirainendovecotMatch1.0.beta7
OR
timo_sirainendovecotMatch1.0.beta8
OR
timo_sirainendovecotMatch1.0.beta9
OR
timo_sirainendovecotMatch1.0.rc1
OR
timo_sirainendovecotMatch1.0.rc2
OR
timo_sirainendovecotMatch1.0.rc3
OR
timo_sirainendovecotMatch1.0.rc4
OR
timo_sirainendovecotMatch1.0.rc5
OR
timo_sirainendovecotMatch1.0.rc6
OR
timo_sirainendovecotMatch1.0.rc7
OR
timo_sirainendovecotMatch1.0.rc8
OR
timo_sirainendovecotMatch1.0.rc9
OR
timo_sirainendovecotMatch1.0.rc10
OR
timo_sirainendovecotMatch1.0.rc11
OR
timo_sirainendovecotMatch1.0.rc12
OR
timo_sirainendovecotMatch1.0.rc13
OR
timo_sirainendovecotMatch1.0.rc14
OR
timo_sirainendovecotMatch1.0.test53
OR
timo_sirainendovecotMatch1.0.test54
OR
timo_sirainendovecotMatch1.0.test55
OR
timo_sirainendovecotMatch1.0.test56
OR
timo_sirainendovecotMatch1.0.test57
OR
timo_sirainendovecotMatch1.0.test58
OR
timo_sirainendovecotMatch1.0.test59
OR
timo_sirainendovecotMatch1.0.test60
OR
timo_sirainendovecotMatch1.0.test61
OR
timo_sirainendovecotMatch1.0.test62
OR
timo_sirainendovecotMatch1.0.test63
OR
timo_sirainendovecotMatch1.0.test64
OR
timo_sirainendovecotMatch1.0.test65
OR
timo_sirainendovecotMatch1.0.test66
OR
timo_sirainendovecotMatch1.0.test67
OR
timo_sirainendovecotMatch1.0.test68
OR
timo_sirainendovecotMatch1.0.test69
OR
timo_sirainendovecotMatch1.0.test70
OR
timo_sirainendovecotMatch1.0.test71
OR
timo_sirainendovecotMatch1.0.test72
OR
timo_sirainendovecotMatch1.0.test73
OR
timo_sirainendovecotMatch1.0.test74
OR
timo_sirainendovecotMatch1.0.test75
OR
timo_sirainendovecotMatch1.0.test76
OR
timo_sirainendovecotMatch1.0.test77
OR
timo_sirainendovecotMatch1.0.test78
OR
timo_sirainendovecotMatch1.0.test79
OR
timo_sirainendovecotMatch1.0.test80

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

6.5 Medium

AI Score

Confidence

Low

0.152 Low

EPSS

Percentile

95.9%