Lucene search

K
nvd[email protected]NVD:CVE-2004-1011
HistoryJan 10, 2005 - 5:00 a.m.

CVE-2004-1011

2005-01-1005:00:00
web.nvd.nist.gov
7

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.8

Confidence

High

EPSS

0.104

Percentile

95.0%

Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.

Affected configurations

Nvd
Node
carnegie_mellon_universitycyrus_imap_serverMatch2.1.7
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.1.9
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.1.10
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.1.16
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.0_alpha
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.1_beta
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.2_beta
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.3
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.4
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.5
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.6
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.7
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.8
OR
openpkgopenpkgMatchcurrent
OR
conectivalinuxMatch9.0
OR
conectivalinuxMatch10.0
Node
redhatfedora_coreMatchcore_2.0
OR
redhatfedora_coreMatchcore_3.0
OR
trustixsecure_linuxMatch2.0
OR
trustixsecure_linuxMatch2.1
OR
trustixsecure_linuxMatch2.2
OR
ubuntuubuntu_linuxMatch4.1ia64
OR
ubuntuubuntu_linuxMatch4.1ppc
VendorProductVersionCPE
carnegie_mellon_universitycyrus_imap_server2.1.7cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.1.9cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.1.10cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.1.16cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.0_alphacpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.1_betacpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.2_betacpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.3cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.4cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.5cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*
Rows per page:
1-10 of 231

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.8

Confidence

High

EPSS

0.104

Percentile

95.0%