Cyrus IMAP pre-login buffer overflow. Vulnerable to remote code execution
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
![]() | FreeBSD : Cyrus IMAP pre-authentication heap overflow vulnerability (33) | 6 Jul 200400:00 | – | nessus |
![]() | Debian DSA-215-1 : cyrus-imapd - buffer overflow | 29 Sep 200400:00 | – | nessus |
![]() | FreeBSD : Cyrus IMAP pre-authentication heap overflow vulnerability (35f6fdf8-a425-11d8-9c6d-0020ed76ef5a) | 23 Apr 200900:00 | – | nessus |
![]() | cyrus-imapd - buffer overflow | 23 Dec 200200:00 | – | osv |
![]() | Cyrus IMAP pre-authentication heap overflow vulnerability | 2 Dec 200200:00 | – | freebsd |
![]() | CVE-2002-1580 | 20 May 200404:00 | – | cvelist |
![]() | CVE-2002-1580 | 14 Jun 200404:00 | – | cve |
![]() | FreeBSD Ports: cyrus | 4 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: cyrus | 4 Sep 200800:00 | – | openvas |
![]() | CVE-2002-1580 | 14 Jun 200404:00 | – | nvd |
Source | Link |
---|---|
securityfocus | www.securityfocus.com/bid/6298 |
securityfocus | www.securityfocus.com/archive/1/301864 |
# SPDX-FileCopyrightText: 2002 Paul Johnston, Westpoint Ltd
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:cyrus:imap";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.11196");
script_version("2023-08-01T13:29:10+0000");
script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-2002-1580");
script_name("Cyrus IMAP pre-login buffer overflow");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2002 Paul Johnston, Westpoint Ltd");
script_family("Gain a shell remotely");
script_dependencies("secpod_cyrus_imap_server_detect.nasl");
script_mandatory_keys("cyrus/imap_server/detected");
script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/301864");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/6298");
script_tag(name:"solution", value:"If possible, upgrade to an unaffected version. However, at
the time of writing no official fix was available. There is a source
patch against 2.1.10 in the referenced Bugtraq report.");
script_tag(name:"summary", value:"According to its banner, the remote Cyrus IMAP
server is vulnerable to a pre-login buffer overrun.");
script_tag(name:"impact", value:"An attacker without a valid login could exploit this, and would be
able to execute arbitrary commands as the owner of the Cyrus
process. This would allow full access to all users' mailboxes.");
script_tag(name:"solution_type", value:"Mitigation");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if( ! port = get_app_port( cpe:CPE ) )
exit( 0 );
if( ! vers = get_app_version( cpe:CPE, port:port ) )
exit( 0 );
if( egrep( pattern:"^(1\.*|2\.0\.*|2\.1\.[1-9][^0-9]|2\.1\.10)[0-9]*$", string:vers ) ) {
report = report_fixed_ver( installed_version:vers, fixed_version:"See references" );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo