Lucene search

K
nvd[email protected]NVD:CVE-2004-1013
HistoryJan 10, 2005 - 5:00 a.m.

CVE-2004-1013

2005-01-1005:00:00
web.nvd.nist.gov
6

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.6

Confidence

High

EPSS

0.107

Percentile

95.1%

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) “body[p”, (2) “binary[p”, or (3) “binary[p”) that cause an index increment error that leads to an out-of-bounds memory corruption.

Affected configurations

Nvd
Node
carnegie_mellon_universitycyrus_imap_serverMatch2.1.7
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.1.9
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.1.10
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.1.16
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.0_alpha
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.1_beta
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.2_beta
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.3
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.4
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.5
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.6
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.7
OR
carnegie_mellon_universitycyrus_imap_serverMatch2.2.8
OR
openpkgopenpkgMatchcurrent
OR
conectivalinuxMatch9.0
OR
conectivalinuxMatch10.0
Node
redhatfedora_coreMatchcore_2.0
OR
redhatfedora_coreMatchcore_3.0
OR
trustixsecure_linuxMatch2.0
OR
trustixsecure_linuxMatch2.1
OR
trustixsecure_linuxMatch2.2
OR
ubuntuubuntu_linuxMatch4.1ia64
OR
ubuntuubuntu_linuxMatch4.1ppc
VendorProductVersionCPE
carnegie_mellon_universitycyrus_imap_server2.1.7cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.1.9cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.1.10cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.1.16cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.0_alphacpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.1_betacpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.2_betacpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.3cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.4cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4:*:*:*:*:*:*:*
carnegie_mellon_universitycyrus_imap_server2.2.5cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5:*:*:*:*:*:*:*
Rows per page:
1-10 of 231

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.6

Confidence

High

EPSS

0.107

Percentile

95.1%