{"cve": [{"lastseen": "2020-10-03T11:51:03", "description": "Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.", "edition": 3, "cvss3": {}, "published": "2008-11-10T14:12:00", "title": "CVE-2008-5005", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": true, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2008-5005"], "modified": "2018-10-11T20:53:00", "cpe": ["cpe:/a:university_of_washington:alpine:0.83", "cpe:/a:university_of_washington:alpine:0.999999", "cpe:/a:university_of_washington:imap_toolkit:2007c", "cpe:/a:university_of_washington:imap_toolkit:2003", "cpe:/a:university_of_washington:alpine:0.999", "cpe:/a:university_of_washington:alpine:0.80", "cpe:/a:university_of_washington:imap_toolkit:2002", "cpe:/a:university_of_washington:imap_toolkit:2004", "cpe:/a:university_of_washington:alpine:0.82", "cpe:/a:university_of_washington:imap_toolkit:2006", "cpe:/a:university_of_washington:alpine:0.9999", "cpe:/a:university_of_washington:alpine:0.81", "cpe:/a:university_of_washington:imap_toolkit:2005", "cpe:/a:university_of_washington:alpine:0.99", "cpe:/a:university_of_washington:alpine:0.98", "cpe:/a:university_of_washington:alpine:0.99999", "cpe:/a:university_of_washington:imap_toolkit:2007", "cpe:/a:university_of_washington:alpine:2.00", "cpe:/a:university_of_washington:alpine:1.10", "cpe:/a:university_of_washington:alpine:1.00"], "id": "CVE-2008-5005", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-5005", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:university_of_washington:imap_toolkit:2006:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:imap_toolkit:2004:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.999999:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.999:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.99999:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:imap_toolkit:2007c:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:2.00:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.99:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:imap_toolkit:2003:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:1.00:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:imap_toolkit:2005:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:1.10:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.98:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:imap_toolkit:2002:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:imap_toolkit:2007:*:*:*:*:*:*:*", "cpe:2.3:a:university_of_washington:alpine:0.9999:*:*:*:*:*:*:*"]}], "redhat": [{"lastseen": "2019-08-13T18:46:18", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5005"], "description": "The imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access protocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail delivery\nutilities shipped with imap. If either of these utilities were used as a\nmail delivery agent, a remote attacker could potentially use this flaw to\nrun arbitrary code as the targeted user by sending a specially-crafted mail\nmessage to the victim. (CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue.", "modified": "2018-05-26T04:26:17", "published": "2009-02-19T05:00:00", "id": "RHSA-2009:0275", "href": "https://access.redhat.com/errata/RHSA-2009:0275", "type": "redhat", "title": "(RHSA-2009:0275) Moderate: imap security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:26:51", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5005"], "description": "**CentOS Errata and Security Advisory** CESA-2009:0275\n\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access protocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail delivery\nutilities shipped with imap. If either of these utilities were used as a\nmail delivery agent, a remote attacker could potentially use this flaw to\nrun arbitrary code as the targeted user by sending a specially-crafted mail\nmessage to the victim. (CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027680.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027682.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027683.html\nhttp://lists.centos.org/pipermail/centos-announce/2009-February/027684.html\n\n**Affected packages:**\nimap\nimap-devel\nimap-utils\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2009-0275.html", "edition": 4, "modified": "2009-02-19T21:43:03", "published": "2009-02-19T18:22:03", "href": "http://lists.centos.org/pipermail/centos-announce/2009-February/027680.html", "id": "CESA-2009:0275", "title": "imap security update", "type": "centos", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:31", "bulletinFamily": "software", "cvelist": ["CVE-2008-5005"], "description": "Buffer overflow in mail delivery foder argument.", "edition": 1, "modified": "2008-11-04T00:00:00", "published": "2008-11-04T00:00:00", "id": "SECURITYVULNS:VULN:9405", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:9405", "title": "dmail / tmail MDA buffer overflow", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2017-07-25T10:55:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "Check for the Version of imap", "modified": "2017-07-10T00:00:00", "published": "2011-08-09T00:00:00", "id": "OPENVAS:880714", "href": "http://plugins.openvas.org/nasl.php?oid=880714", "type": "openvas", "title": "CentOS Update for imap CESA-2009:0275 centos3 i386", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# CentOS Update for imap CESA-2009:0275 centos3 i386\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2011 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The imap package provides server daemons for both the IMAP (Internet\n Message Access Protocol) and POP (Post Office Protocol) mail access protocols.\n\n A buffer overflow flaw was discovered in the dmail and tmail mail delivery\n utilities shipped with imap. If either of these utilities were used as a\n mail delivery agent, a remote attacker could potentially use this flaw to\n run arbitrary code as the targeted user by sending a specially-crafted mail\n message to the victim. (CVE-2008-5005)\n \n Users of imap should upgrade to these updated packages, which contain a\n backported patch to resolve this issue.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\ntag_affected = \"imap on CentOS 3\";\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.centos.org/pipermail/centos-announce/2009-February/015645.html\");\n script_id(880714);\n script_version(\"$Revision: 6653 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 13:46:53 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-09 08:20:34 +0200 (Tue, 09 Aug 2011)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"CESA\", value: \"2009:0275\");\n script_cve_id(\"CVE-2008-5005\");\n script_name(\"CentOS Update for imap CESA-2009:0275 centos3 i386\");\n\n script_summary(\"Check for the Version of imap\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2011 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"CentOS3\")\n{\n\n if ((res = isrpmvuln(pkg:\"imap\", rpm:\"imap~2002d~15\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"imap-devel\", rpm:\"imap-devel~2002d~15\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"imap-utils\", rpm:\"imap-utils~2002d~15\", rls:\"CentOS3\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-27T10:55:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The remote host is missing updates announced in\nadvisory RHSA-2009:0275.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access protocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail delivery\nutilities shipped with imap. If either of these utilities were used as a\nmail delivery agent, a remote attacker could potentially use this flaw to\nrun arbitrary code as the targeted user by sending a specially-crafted mail\nmessage to the victim. (CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue.", "modified": "2017-07-12T00:00:00", "published": "2009-02-23T00:00:00", "id": "OPENVAS:63419", "href": "http://plugins.openvas.org/nasl.php?oid=63419", "type": "openvas", "title": "RedHat Security Advisory RHSA-2009:0275", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: RHSA_2009_0275.nasl 6683 2017-07-12 09:41:57Z cfischer $\n# Description: Auto-generated from advisory RHSA-2009:0275 ()\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates announced in\nadvisory RHSA-2009:0275.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access protocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail delivery\nutilities shipped with imap. If either of these utilities were used as a\nmail delivery agent, a remote attacker could potentially use this flaw to\nrun arbitrary code as the targeted user by sending a specially-crafted mail\nmessage to the victim. (CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain a\nbackported patch to resolve this issue.\";\n\ntag_solution = \"Please note that this update is available via\nRed Hat Network. To use Red Hat Network, launch the Red\nHat Update Agent with the following command: up2date\";\n\n\n\nif(description)\n{\n script_id(63419);\n script_version(\"$Revision: 6683 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-12 11:41:57 +0200 (Wed, 12 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)\");\n script_cve_id(\"CVE-2008-5005\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"RedHat Security Advisory RHSA-2009:0275\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Red Hat Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/rhel\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name : \"URL\" , value : \"http://rhn.redhat.com/errata/RHSA-2009-0275.html\");\n script_xref(name : \"URL\" , value : \"http://www.redhat.com/security/updates/classification/#moderate\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"imap\", rpm:\"imap~2002d~15\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-debuginfo\", rpm:\"imap-debuginfo~2002d~15\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-devel\", rpm:\"imap-devel~2002d~15\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-utils\", rpm:\"imap-utils~2002d~15\", rls:\"RHENT_3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The host has UW-imapd installed and is prone to Buffer Overflow\n vulnerabilities.", "modified": "2016-10-07T00:00:00", "published": "2008-12-04T00:00:00", "id": "OPENVAS:800149", "href": "http://plugins.openvas.org/nasl.php?oid=800149", "type": "openvas", "title": "UW-imapd tmail and dmail BOF Vulnerabilities (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_uw_imapd_tmail_n_dmail_bof_vuln_lin.nasl 4227 2016-10-07 05:45:35Z teissa $\n#\n# UW-imapd tmail and dmail BOF Vulnerabilities (Linux)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_impact = \"Successful exploitation allows execution of arbitrary code, but requires\n that the utilities are configured as a delivery backend for a mail transfer\n agent allowing overly long destination mailbox names.\n Impact Level: Application\";\ntag_affected = \"University of Washington Alpine 2.00 and priror on Linux.\n University Of Washington's imapd Versions prior to 2007d on Linux.\";\ntag_insight = \"The flaws are due to boundary error in the tmail/dmail utility,\n when processing overly long mailbox names composed of a username and '+'\n character followed by a long string and when specifying a long folder\n extension argument on the command line.\";\ntag_solution = \"Update to Version 2007d.\n http://www.washington.edu/imap/\n http://www.washington.edu/alpine/tmailbug.html\";\ntag_summary = \"The host has UW-imapd installed and is prone to Buffer Overflow\n vulnerabilities.\";\n\nif(description)\n{\n script_id(800149);\n script_version(\"$Revision: 4227 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-10-07 07:45:35 +0200 (Fri, 07 Oct 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-12-04 14:15:00 +0100 (Thu, 04 Dec 2008)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-5005\");\n script_bugtraq_id(32072);\n script_name(\"UW-imapd tmail and dmail BOF Vulnerabilities (Linux)\");\n script_xref(name : \"URL\" , value : \"http://www.washington.edu/alpine/\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/32483\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_mandatory_keys(\"login/SSH/success\");\n script_dependencies(\"gather-package-list.nasl\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"ssh_func.inc\");\ninclude(\"version_func.inc\");\n\nsock = ssh_login_or_reuse_connection();\nif(!sock){\n exit(0);\n}\n\ngrep = find_bin(prog_name:\"grep\", sock:sock);\ngrep = chomp(grep[0]);\n\ngarg[0] = \"-o\";\ngarg[1] = \"-m1\";\ngarg[2] = \"-a\";\ngarg[3] = string(\"[0-9]\\\\+[0-9]\\\\+[0-9]\\\\+[0-9]a\\\\?.*OK\");\n\nimapPath = find_file(file_name:\"imapd\", file_path:\"/\",\n useregex:TRUE, regexpar:\"$\", sock:sock);\n\nforeach imapBin (imapPath)\n{\n imapBin = chomp(imapBin);\n if(islocalhost())\n {\n garg[4] = imapBin;\n arg = garg;\n }\n else\n {\n arg = garg[0] + \" \" + garg[1] + \" \" + garg[2] + \" \" +\n raw_string(0x22) + garg[3] + raw_string(0x22) + \" \" + imapBin;\n }\n\n imapVer = get_bin_version(full_prog_name:grep, version_argv:arg, sock:sock,\n ver_pattern:\"[0-9][0-9][0-9][0-9][a-z]?\");\n if(imapVer[1] != NULL)\n {\n if(version_is_less(version:imapVer[1] ,test_version:\"2007d\")){\n security_message(0);\n }\n ssh_close_connection();\n exit(0);\n }\n}\nssh_close_connection();\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-04-29T22:26:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The host has Alpine installed and is prone to Buffer Overflow\n Vulnerabilities.", "modified": "2020-04-27T00:00:00", "published": "2008-12-04T00:00:00", "id": "OPENVAS:1361412562310800150", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800150", "type": "openvas", "title": "Alpine tmail and dmail Buffer Overflow Vulnerabilities (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Alpine tmail and dmail Buffer Overflow Vulnerabilities (Windows)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800150\");\n script_version(\"2020-04-27T11:01:03+0000\");\n script_tag(name:\"last_modification\", value:\"2020-04-27 11:01:03 +0000 (Mon, 27 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2008-12-04 14:15:00 +0100 (Thu, 04 Dec 2008)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-5005\");\n script_bugtraq_id(32072);\n script_name(\"Alpine tmail and dmail Buffer Overflow Vulnerabilities (Windows)\");\n\n script_xref(name:\"URL\", value:\"http://www.washington.edu/alpine/\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/32483\");\n script_xref(name:\"URL\", value:\"http://www.frsirt.com/english/advisories/2008/3042/products\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n\n script_tag(name:\"impact\", value:\"Successful exploitation allows execution of arbitrary code, but requires\n that the utilities are configured as a delivery backend for a mail transfer\n agent allowing overly long destination mailbox names.\");\n\n script_tag(name:\"affected\", value:\"University of Washington Alpine 2.00 and priror on Windows.\");\n\n script_tag(name:\"insight\", value:\"The flaws are due to boundary error in the tmail/dmail utility,\n when processing overly long mailbox names composed of a username and +\n character followed by a long string and also by specifying a long folder\n extension argument on the command line.\");\n\n script_tag(name:\"summary\", value:\"The host has Alpine installed and is prone to Buffer Overflow\n Vulnerabilities.\");\n\n script_tag(name:\"solution\", value:\"Update to a higher version.\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\napVer = registry_get_sz(item:\"DisplayName\",\n key:\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Alpine_is1\");\nif(!apVer){\n exit(0);\n}\n\napVer = apVer - \"Alpine \";\nif(version_is_less_equal(version:apVer, test_version:\"2.00\")){\n report = report_fixed_ver(installed_version:apVer, vulnerable_range:\"Less than or equal to 2.00\");\n security_message(port: 0, data: report);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2018-04-06T11:38:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The remote host is missing updates to imap announced in\nadvisory CESA-2009:0275.", "modified": "2018-04-06T00:00:00", "published": "2009-02-23T00:00:00", "id": "OPENVAS:136141256231063432", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063432", "type": "openvas", "title": "CentOS Security Advisory CESA-2009:0275 (imap)", "sourceData": "#CESA-2009:0275 63432 4\n# $Id: ovcesa2009_0275.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory CESA-2009:0275 (imap)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"For details on the issues addressed in this update,\nplease visit the referenced security advisories.\";\ntag_solution = \"Update the appropriate packages on your system.\n\nhttp://www.securityspace.com/smysecure/catid.html?in=CESA-2009:0275\nhttp://www.securityspace.com/smysecure/catid.html?in=RHSA-2009:0275\nhttps://rhn.redhat.com/errata/RHSA-2009-0275.html\";\ntag_summary = \"The remote host is missing updates to imap announced in\nadvisory CESA-2009:0275.\";\n\n\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63432\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-23 21:31:14 +0100 (Mon, 23 Feb 2009)\");\n script_cve_id(\"CVE-2008-5005\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"CentOS Security Advisory CESA-2009:0275 (imap)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"imap\", rpm:\"imap~2002d~15\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-devel\", rpm:\"imap-devel~2002d~15\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-utils\", rpm:\"imap-utils~2002d~15\", rls:\"CentOS3\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:39:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The remote host is missing an update to imap\nannounced via advisory MDVSA-2009:064.", "modified": "2018-04-06T00:00:00", "published": "2009-03-07T00:00:00", "id": "OPENVAS:136141256231063481", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231063481", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:064 (imap)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_064.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:064 (imap)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Security vulnerabilities has been identified and fixed in University\nof Washington IMAP Toolkit which could allow local users to gain\nprivileges by specifying incorrect folder name (CVE-2008-5005).\n\nThe updated packages have been patched to prevent this.\n\nAffected: Corporate 3.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:064\";\ntag_summary = \"The remote host is missing an update to imap\nannounced via advisory MDVSA-2009:064.\";\n\n \n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.63481\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-07 21:47:03 +0100 (Sat, 07 Mar 2009)\");\n script_cve_id(\"CVE-2008-5005\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:064 (imap)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"imap\", rpm:\"imap~2002d~8.4.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-devel\", rpm:\"imap-devel~2002d~8.4.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-utils\", rpm:\"imap-utils~2002d~8.4.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2020-07-21T22:09:39", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The host has UW-imapd installed and is prone to Buffer Overflow\n vulnerabilities.", "modified": "2020-06-22T00:00:00", "published": "2008-12-04T00:00:00", "id": "OPENVAS:1361412562310800149", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310800149", "type": "openvas", "title": "UW-imapd tmail and dmail BOF Vulnerabilities (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# UW-imapd tmail and dmail BOF Vulnerabilities (Linux)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.800149\");\n script_version(\"2020-06-22T08:41:58+0000\");\n script_tag(name:\"last_modification\", value:\"2020-06-22 08:41:58 +0000 (Mon, 22 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2008-12-04 14:15:00 +0100 (Thu, 04 Dec 2008)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-5005\");\n script_bugtraq_id(32072);\n script_name(\"UW-imapd tmail and dmail BOF Vulnerabilities (Linux)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"login/SSH/success\");\n script_exclude_keys(\"ssh/no_linux_shell\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/32483\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation allows execution of arbitrary code, but requires\n that the utilities are configured as a delivery backend for a mail transfer\n agent allowing overly long destination mailbox names.\");\n\n script_tag(name:\"affected\", value:\"University of Washington Alpine 2.00 and priror on Linux.\n University Of Washington's imapd Versions prior to 2007d on Linux.\");\n\n script_tag(name:\"insight\", value:\"The flaws are due to boundary error in the tmail/dmail utility,\n when processing overly long mailbox names composed of a username and '+'\n character followed by a long string and when specifying a long folder\n extension argument on the command line.\");\n\n script_tag(name:\"solution\", value:\"Update to Version 2007d.\");\n\n script_tag(name:\"summary\", value:\"The host has UW-imapd installed and is prone to Buffer Overflow\n vulnerabilities.\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n exit(0);\n}\n\ninclude(\"ssh_func.inc\");\ninclude(\"version_func.inc\");\n\nsock = ssh_login_or_reuse_connection();\nif(!sock)\n exit(0);\n\ngarg[0] = \"-o\";\ngarg[1] = \"-m1\";\ngarg[2] = \"-a\";\ngarg[3] = string(\"[0-9]\\\\+[0-9]\\\\+[0-9]\\\\+[0-9]a\\\\?.*OK\");\n\nimapPath = ssh_find_file(file_name:\"/imapd\", useregex:TRUE, regexpar:\"$\", sock:sock);\nforeach imapBin (imapPath) {\n\n imapBin = chomp(imapBin);\n if(!imapBin) continue;\n\n arg = garg[0] + \" \" + garg[1] + \" \" + garg[2] + \" \" + raw_string(0x22) + garg[3] + raw_string(0x22) + \" \" + imapBin;\n\n imapVer = ssh_get_bin_version(full_prog_name:\"grep\", version_argv:arg, sock:sock, ver_pattern:\"[0-9][0-9][0-9][0-9][a-z]?\");\n if(imapVer[1]){\n if(version_is_less(version:imapVer[1], test_version:\"2007d\")){\n report = report_fixed_ver(installed_version:imapVer[1], fixed_version:\"2007d\", install_path:imapBin);\n security_message(port:0, data:report);\n ssh_close_connection();\n exit(0);\n }\n }\n}\n\nssh_close_connection();\nexit(0);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-25T10:56:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "Check for the Version of uw-imap", "modified": "2017-07-10T00:00:00", "published": "2009-02-17T00:00:00", "id": "OPENVAS:860075", "href": "http://plugins.openvas.org/nasl.php?oid=860075", "type": "openvas", "title": "Fedora Update for uw-imap FEDORA-2008-9396", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for uw-imap FEDORA-2008-9396\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_affected = \"uw-imap on Fedora 9\";\ntag_insight = \"The uw-imap package provides UW server daemons for both the IMAP (Internet\n Message Access Protocol) and POP (Post Office Protocol) mail access\n protocols. The POP protocol uses a "post office" machine to collect\n mail for users and allows users to download their mail to their local\n machine for reading. The IMAP protocol allows a user to read mail on a\n remote machine without downloading it to their local machine.\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00082.html\");\n script_id(860075);\n script_cve_id(\"CVE-2008-5005\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-17 17:07:33 +0100 (Tue, 17 Feb 2009)\");\n script_xref(name: \"FEDORA\", value: \"2008-9396\");\n script_name( \"Fedora Update for uw-imap FEDORA-2008-9396\");\n\n script_summary(\"Check for the Version of uw-imap\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC9\")\n{\n\n if ((res = isrpmvuln(pkg:\"uw-imap\", rpm:\"uw-imap~2007d~1.fc9\", rls:\"FC9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-02T21:10:19", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The host has Alpine installed and is prone to Buffer Overflow\n Vulnerabilities.", "modified": "2017-02-20T00:00:00", "published": "2008-12-04T00:00:00", "id": "OPENVAS:800150", "href": "http://plugins.openvas.org/nasl.php?oid=800150", "type": "openvas", "title": "Alpine tmail and dmail Buffer Overflow Vulnerabilities (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_alpine_tmail_n_dmail_bof_vuln_win.nasl 5370 2017-02-20 15:24:26Z cfi $\n#\n# Alpine tmail and dmail Buffer Overflow Vulnerabilities (Windows)\n#\n# Authors:\n# Veerendra GG <veerendragg@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2008 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_solution = \"Update to higher Version or Apply patches from,\n http://www.washington.edu/alpine/tmailbug.html\n\n *****\n NOTE : Ignore this warning, if above mentioned patch is applied already.\n *****\";\n\ntag_impact = \"Successful exploitation allows execution of arbitrary code, but requires\n that the utilities are configured as a delivery backend for a mail transfer\n agent allowing overly long destination mailbox names.\n Impact Level: Application\";\ntag_affected = \"University of Washington Alpine 2.00 and priror on Windows.\";\ntag_insight = \"The flaws are due to boundary error in the tmail/dmail utility,\n when processing overly long mailbox names composed of a username and +\n character followed by a long string and also by specifying a long folder\n extension argument on the command line.\";\ntag_summary = \"The host has Alpine installed and is prone to Buffer Overflow\n Vulnerabilities.\";\n\nif(description)\n{\n script_id(800150);\n script_version(\"$Revision: 5370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-02-20 16:24:26 +0100 (Mon, 20 Feb 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-12-04 14:15:00 +0100 (Thu, 04 Dec 2008)\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cve_id(\"CVE-2008-5005\");\n script_bugtraq_id(32072);\n script_name(\"Alpine tmail and dmail Buffer Overflow Vulnerabilities (Windows)\");\n\n script_xref(name : \"URL\" , value : \"http://www.washington.edu/alpine/\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/32483\");\n script_xref(name : \"URL\" , value : \"http://www.frsirt.com/english/advisories/2008/3042/products\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2008 Greenbone Networks GmbH\");\n script_family(\"Buffer overflow\");\n script_dependencies(\"secpod_reg_enum.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"version_func.inc\");\n\nif(!get_kb_item(\"SMB/WindowsVersion\")){\n exit(0);\n}\n\napVer = registry_get_sz(item:\"DisplayName\",\n key:\"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\Alpine_is1\");\nif(!apVer){\n exit(0);\n}\n\napVer = apVer - \"Alpine \";\nif(version_is_less_equal(version:apVer, test_version:\"2.00\")){\n security_message(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:56:53", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "description": "The remote host is missing an update to imap\nannounced via advisory MDVSA-2009:064.", "modified": "2017-07-07T00:00:00", "published": "2009-03-07T00:00:00", "id": "OPENVAS:63481", "href": "http://plugins.openvas.org/nasl.php?oid=63481", "type": "openvas", "title": "Mandrake Security Advisory MDVSA-2009:064 (imap)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: mdksa_2009_064.nasl 6587 2017-07-07 06:35:35Z cfischer $\n# Description: Auto-generated from advisory MDVSA-2009:064 (imap)\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Security vulnerabilities has been identified and fixed in University\nof Washington IMAP Toolkit which could allow local users to gain\nprivileges by specifying incorrect folder name (CVE-2008-5005).\n\nThe updated packages have been patched to prevent this.\n\nAffected: Corporate 3.0\";\ntag_solution = \"To upgrade automatically use MandrakeUpdate or urpmi. The verification\nof md5 checksums and GPG signatures is performed automatically for you.\n\nhttps://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:064\";\ntag_summary = \"The remote host is missing an update to imap\nannounced via advisory MDVSA-2009:064.\";\n\n \n\nif(description)\n{\n script_id(63481);\n script_version(\"$Revision: 6587 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 08:35:35 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-07 21:47:03 +0100 (Sat, 07 Mar 2009)\");\n script_cve_id(\"CVE-2008-5005\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_name(\"Mandrake Security Advisory MDVSA-2009:064 (imap)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/rpms\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"imap\", rpm:\"imap~2002d~8.4.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-devel\", rpm:\"imap-devel~2002d~8.4.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\nif ((res = isrpmvuln(pkg:\"imap-utils\", rpm:\"imap-utils~2002d~8.4.C30mdk\", rls:\"MNDK_3.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-06T09:25:32", "description": "Updated imap packages to fix a security issue are now available for\nRed Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access\nprotocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain\na backported patch to resolve this issue.", "edition": 25, "published": "2009-02-20T00:00:00", "title": "CentOS 3 : imap (CESA-2009:0275)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "modified": "2009-02-20T00:00:00", "cpe": ["p-cpe:/a:centos:centos:imap-devel", "p-cpe:/a:centos:centos:imap-utils", "p-cpe:/a:centos:centos:imap", "cpe:/o:centos:centos:3"], "id": "CENTOS_RHSA-2009-0275.NASL", "href": "https://www.tenable.com/plugins/nessus/35718", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0275 and \n# CentOS Errata and Security Advisory 2009:0275 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35718);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-5005\");\n script_xref(name:\"RHSA\", value:\"2009:0275\");\n\n script_name(english:\"CentOS 3 : imap (CESA-2009:0275)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated imap packages to fix a security issue are now available for\nRed Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access\nprotocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain\na backported patch to resolve this issue.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-February/015642.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?66113f54\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-February/015645.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?71e6a1ff\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2009-February/015646.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?914a1736\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected imap packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:imap-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:imap-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/02/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"imap-2002d-15\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"imap-devel-2002d-15\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"imap-utils-2002d-15\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"imap / imap-devel / imap-utils\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:06:45", "description": "Addresses a security vulnerability in tmail and dmail:\nhttp://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267\n.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2008-11-06T00:00:00", "title": "Fedora 9 : uw-imap-2007d-1.fc9 (2008-9396)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "modified": "2008-11-06T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:9", "p-cpe:/a:fedoraproject:fedora:uw-imap"], "id": "FEDORA_2008-9396.NASL", "href": "https://www.tenable.com/plugins/nessus/34707", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-9396.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34707);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2008-5005\");\n script_xref(name:\"FEDORA\", value:\"2008-9396\");\n\n script_name(english:\"Fedora 9 : uw-imap-2007d-1.fc9 (2008-9396)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Addresses a security vulnerability in tmail and dmail:\nhttp://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267\n.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c83b2a7a\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=469667\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-November/015949.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bdcb1532\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected uw-imap package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:uw-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:9\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/11/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^9([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 9.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC9\", reference:\"uw-imap-2007d-1.fc9\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"uw-imap\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:44:08", "description": "A buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)", "edition": 24, "published": "2012-08-01T00:00:00", "title": "Scientific Linux Security Update : imap on SL3.x i386/x86_64", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "modified": "2012-08-01T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20090219_IMAP_ON_SL3_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60537", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60537);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-5005\");\n\n script_name(english:\"Scientific Linux Security Update : imap on SL3.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0902&L=scientific-linux-errata&T=0&P=2403\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a5b90c68\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected imap, imap-devel and / or imap-utils packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL3\", reference:\"imap-2002d-15\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"imap-devel-2002d-15\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"imap-utils-2002d-15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T12:44:21", "description": "From Red Hat Security Advisory 2009:0275 :\n\nUpdated imap packages to fix a security issue are now available for\nRed Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access\nprotocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain\na backported patch to resolve this issue.", "edition": 23, "published": "2013-07-12T00:00:00", "title": "Oracle Linux 3 : imap (ELSA-2009-0275)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "modified": "2013-07-12T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:imap-devel", "cpe:/o:oracle:linux:3", "p-cpe:/a:oracle:linux:imap-utils", "p-cpe:/a:oracle:linux:imap"], "id": "ORACLELINUX_ELSA-2009-0275.NASL", "href": "https://www.tenable.com/plugins/nessus/67805", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2009:0275 and \n# Oracle Linux Security Advisory ELSA-2009-0275 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67805);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-5005\");\n script_xref(name:\"RHSA\", value:\"2009:0275\");\n\n script_name(english:\"Oracle Linux 3 : imap (ELSA-2009-0275)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2009:0275 :\n\nUpdated imap packages to fix a security issue are now available for\nRed Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access\nprotocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain\na backported patch to resolve this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2009-February/000895.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected imap packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:imap-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:imap-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 3\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"imap-2002d-15\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"imap-2002d-15\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"imap-devel-2002d-15\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"imap-devel-2002d-15\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"imap-utils-2002d-15\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"imap-utils-2002d-15\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"imap / imap-devel / imap-utils\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T13:06:30", "description": "Updated imap packages to fix a security issue are now available for\nRed Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access\nprotocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain\na backported patch to resolve this issue.", "edition": 26, "published": "2009-02-20T00:00:00", "title": "RHEL 3 : imap (RHSA-2009:0275)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "modified": "2009-02-20T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:3", "p-cpe:/a:redhat:enterprise_linux:imap-utils", "p-cpe:/a:redhat:enterprise_linux:imap", "p-cpe:/a:redhat:enterprise_linux:imap-devel"], "id": "REDHAT-RHSA-2009-0275.NASL", "href": "https://www.tenable.com/plugins/nessus/35721", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2009:0275. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35721);\n script_version(\"1.24\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2008-5005\");\n script_xref(name:\"RHSA\", value:\"2009:0275\");\n\n script_name(english:\"RHEL 3 : imap (RHSA-2009:0275)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated imap packages to fix a security issue are now available for\nRed Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the\nRed Hat Security Response Team.\n\nThe imap package provides server daemons for both the IMAP (Internet\nMessage Access Protocol) and POP (Post Office Protocol) mail access\nprotocols.\n\nA buffer overflow flaw was discovered in the dmail and tmail mail\ndelivery utilities shipped with imap. If either of these utilities\nwere used as a mail delivery agent, a remote attacker could\npotentially use this flaw to run arbitrary code as the targeted user\nby sending a specially crafted mail message to the victim.\n(CVE-2008-5005)\n\nUsers of imap should upgrade to these updated packages, which contain\na backported patch to resolve this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2008-5005\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2009:0275\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected imap, imap-devel and / or imap-utils packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:imap-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:imap-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2008/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/02/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^3([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 3.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2009:0275\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL3\", reference:\"imap-2002d-15\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"imap-devel-2002d-15\")) flag++;\n if (rpm_check(release:\"RHEL3\", reference:\"imap-utils-2002d-15\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"imap / imap-devel / imap-utils\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T10:06:44", "description": "Addresses a security vulnerability in tmail and dmail:\nhttp://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267\n.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "published": "2008-11-06T00:00:00", "title": "Fedora 8 : uw-imap-2007d-1.fc8 (2008-9383)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005"], "modified": "2008-11-06T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:8", "p-cpe:/a:fedoraproject:fedora:uw-imap"], "id": "FEDORA_2008-9383.NASL", "href": "https://www.tenable.com/plugins/nessus/34706", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2008-9383.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(34706);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2008-5005\");\n script_xref(name:\"FEDORA\", value:\"2008-9383\");\n\n script_name(english:\"Fedora 8 : uw-imap-2007d-1.fc8 (2008-9383)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Addresses a security vulnerability in tmail and dmail:\nhttp://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267\n.html\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c83b2a7a\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=469667\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2008-November/015925.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6500427f\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected uw-imap package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:uw-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:8\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/11/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/11/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 8.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC8\", reference:\"uw-imap-2007d-1.fc8\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"uw-imap\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-06T09:45:11", "description": "Two vulnerabilities have been found in uw-imap, an IMAP\nimplementation. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\nIt was discovered that several buffer overflows can be triggered via a\nlong folder extension argument to the tmail or dmail program. This\ncould lead to arbitrary code execution (CVE-2008-5005 ).\n\nIt was discovered that a NULL pointer dereference could be triggered\nby a malicious response to the QUIT command leading to a denial of\nservice (CVE-2008-5006 ).", "edition": 26, "published": "2008-12-15T00:00:00", "title": "Debian DSA-1685-1 : uw-imap - buffer overflows, NULL pointer dereference", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005", "CVE-2008-5006"], "modified": "2008-12-15T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:4.0", "p-cpe:/a:debian:debian_linux:uw-imap"], "id": "DEBIAN_DSA-1685.NASL", "href": "https://www.tenable.com/plugins/nessus/35091", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1685. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(35091);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2008-5005\", \"CVE-2008-5006\");\n script_xref(name:\"DSA\", value:\"1685\");\n\n script_name(english:\"Debian DSA-1685-1 : uw-imap - buffer overflows, NULL pointer dereference\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Two vulnerabilities have been found in uw-imap, an IMAP\nimplementation. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\nIt was discovered that several buffer overflows can be triggered via a\nlong folder extension argument to the tmail or dmail program. This\ncould lead to arbitrary code execution (CVE-2008-5005 ).\n\nIt was discovered that a NULL pointer dereference could be triggered\nby a malicious response to the QUIT command leading to a denial of\nservice (CVE-2008-5006 ).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-5005\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2008-5006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2008/dsa-1685\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the uw-imap packages.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 2002edebian1-13.1+etch1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:uw-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2008/12/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2008/12/15\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2008-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"4.0\", prefix:\"ipopd\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"ipopd-ssl\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libc-client-dev\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libc-client2002edebian\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"mlock\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"uw-imapd\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"uw-imapd-ssl\", reference:\"2002edebian1-13.1+etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"uw-mailutils\", reference:\"2002edebian1-13.1+etch1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:52:35", "description": "The remote host is affected by the vulnerability described in GLSA-200911-03\n(UW IMAP toolkit: Multiple vulnerabilities)\n\n Multiple vulnerabilities were found in the UW IMAP toolkit:\n Aron Andersson and Jan Sahlin of Bitsec reported boundary errors in\n the 'tmail' and 'dmail' utilities when processing overly long mailbox\n names, leading to stack-based buffer overflows (CVE-2008-5005).\n An error in smtp.c in the c-client library was found, leading to a\n NULL pointer dereference vulnerability (CVE-2008-5006).\n Ludwig\n Nussel reported an off-by-one error in the rfc822_output_char()\n function in the RFC822BUFFER routines in the c-client library, as used\n by the UW IMAP toolkit (CVE-2008-5514).\n \nImpact :\n\n A remote attacker could send an e-mail to a destination mailbox name\n composed of a username and '+' character followed by a long string,\n possibly leading to the execution of arbitrary code. A local attacker\n could gain privileges by specifying a long folder extension argument to\n the tmail or dmail program. Furthermore, a remote attacker could send a\n specially crafted mail message to the UW IMAP toolkit or another daemon\n using the c-client library, leading to a Denial of Service. A remote\n SMTP server could respond to the QUIT command with a close of the TCP\n connection instead of the expected 221 response code, possibly leading\n to a Denial of Service.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 26, "published": "2009-11-30T00:00:00", "title": "GLSA-200911-03 : UW IMAP toolkit: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005", "CVE-2008-5514", "CVE-2008-5006"], "modified": "2009-11-30T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:uw-imap", "p-cpe:/a:gentoo:linux:c-client"], "id": "GENTOO_GLSA-200911-03.NASL", "href": "https://www.tenable.com/plugins/nessus/42913", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200911-03.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(42913);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-5005\", \"CVE-2008-5006\", \"CVE-2008-5514\");\n script_bugtraq_id(32958);\n script_xref(name:\"GLSA\", value:\"200911-03\");\n\n script_name(english:\"GLSA-200911-03 : UW IMAP toolkit: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200911-03\n(UW IMAP toolkit: Multiple vulnerabilities)\n\n Multiple vulnerabilities were found in the UW IMAP toolkit:\n Aron Andersson and Jan Sahlin of Bitsec reported boundary errors in\n the 'tmail' and 'dmail' utilities when processing overly long mailbox\n names, leading to stack-based buffer overflows (CVE-2008-5005).\n An error in smtp.c in the c-client library was found, leading to a\n NULL pointer dereference vulnerability (CVE-2008-5006).\n Ludwig\n Nussel reported an off-by-one error in the rfc822_output_char()\n function in the RFC822BUFFER routines in the c-client library, as used\n by the UW IMAP toolkit (CVE-2008-5514).\n \nImpact :\n\n A remote attacker could send an e-mail to a destination mailbox name\n composed of a username and '+' character followed by a long string,\n possibly leading to the execution of arbitrary code. A local attacker\n could gain privileges by specifying a long folder extension argument to\n the tmail or dmail program. Furthermore, a remote attacker could send a\n specially crafted mail message to the UW IMAP toolkit or another daemon\n using the c-client library, leading to a Denial of Service. A remote\n SMTP server could respond to the QUIT command with a close of the TCP\n connection instead of the expected 221 response code, possibly leading\n to a Denial of Service.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200911-03\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All c-client library users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-libs/c-client-2007e'\n All UW IMAP toolkit users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=net-mail/uw-imap-2007e'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:c-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:uw-imap\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/11/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/11/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"net-libs/c-client\", unaffected:make_list(\"ge 2007e\"), vulnerable:make_list(\"lt 2007e\"))) flag++;\nif (qpkg_check(package:\"net-mail/uw-imap\", unaffected:make_list(\"ge 2007e\"), vulnerable:make_list(\"lt 2007e\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"UW IMAP toolkit\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T11:52:12", "description": "Security vulnerabilities has been identified and fixed in University\nof Washington IMAP Toolkit :\n\nMultiple stack-based buffer overflows in (1) University of Washington\nIMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine\n2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain\nprivileges by specifying a long folder extension argument on the\ncommand line to the tmail or dmail program; and (b) remote attackers\nto execute arbitrary code by sending e-mail to a destination mailbox\nname composed of a username and '+' character followed by a long\nstring, processed by the tmail or possibly dmail program\n(CVE-2008-5005).\n\nsmtp.c in the c-client library in University of Washington IMAP\nToolkit 2007b allows remote SMTP servers to cause a denial of service\n(NULL pointer dereference and application crash) by responding to the\nQUIT command with a close of the TCP connection instead of the\nexpected 221 response code (CVE-2008-5006).\n\nOff-by-one error in the rfc822_output_char function in the\nRFC822BUFFER routines in the University of Washington (UW) c-client\nlibrary, as used by the UW IMAP toolkit before imap-2007e and other\napplications, allows context-dependent attackers to cause a denial of\nservice (crash) via an e-mail message that triggers a buffer overflow\n(CVE-2008-5514).\n\nThe updated packages have been patched to prevent this. Note that the\nsoftware was renamed to c-client starting from Mandriva Linux 2009.0\nand only provides the shared c-client library for the imap functions\nin PHP.\n\nUpdate :\n\nPackages for 2008.0 are provided for Corporate Desktop 2008.0\ncustomers.", "edition": 26, "published": "2009-06-30T00:00:00", "title": "Mandriva Linux Security Advisory : imap (MDVSA-2009:146-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2008-5005", "CVE-2008-5514", "CVE-2008-5006"], "modified": "2009-06-30T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:imap-devel", "p-cpe:/a:mandriva:linux:imap-utils", "p-cpe:/a:mandriva:linux:libc-client-php-devel", "cpe:/o:mandriva:linux:2008.0", "p-cpe:/a:mandriva:linux:libc-client-php0", "p-cpe:/a:mandriva:linux:lib64c-client-php0", "p-cpe:/a:mandriva:linux:lib64c-client-php-devel", "p-cpe:/a:mandriva:linux:imap"], "id": "MANDRIVA_MDVSA-2009-146.NASL", "href": "https://www.tenable.com/plugins/nessus/39573", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandriva Linux Security Advisory MDVSA-2009:146. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(39573);\n script_version(\"1.16\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2008-5005\", \"CVE-2008-5006\", \"CVE-2008-5514\");\n script_bugtraq_id(32958);\n script_xref(name:\"MDVSA\", value:\"2009:146-1\");\n\n script_name(english:\"Mandriva Linux Security Advisory : imap (MDVSA-2009:146-1)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandriva Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security vulnerabilities has been identified and fixed in University\nof Washington IMAP Toolkit :\n\nMultiple stack-based buffer overflows in (1) University of Washington\nIMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine\n2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain\nprivileges by specifying a long folder extension argument on the\ncommand line to the tmail or dmail program; and (b) remote attackers\nto execute arbitrary code by sending e-mail to a destination mailbox\nname composed of a username and '+' character followed by a long\nstring, processed by the tmail or possibly dmail program\n(CVE-2008-5005).\n\nsmtp.c in the c-client library in University of Washington IMAP\nToolkit 2007b allows remote SMTP servers to cause a denial of service\n(NULL pointer dereference and application crash) by responding to the\nQUIT command with a close of the TCP connection instead of the\nexpected 221 response code (CVE-2008-5006).\n\nOff-by-one error in the rfc822_output_char function in the\nRFC822BUFFER routines in the University of Washington (UW) c-client\nlibrary, as used by the UW IMAP toolkit before imap-2007e and other\napplications, allows context-dependent attackers to cause a denial of\nservice (crash) via an e-mail message that triggers a buffer overflow\n(CVE-2008-5514).\n\nThe updated packages have been patched to prevent this. Note that the\nsoftware was renamed to c-client starting from Mandriva Linux 2009.0\nand only provides the shared c-client library for the imap functions\nin PHP.\n\nUpdate :\n\nPackages for 2008.0 are provided for Corporate Desktop 2008.0\ncustomers.\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:imap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:imap-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:imap-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64c-client-php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64c-client-php0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libc-client-php-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libc-client-php0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2008.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2009/12/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/06/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2008.0\", reference:\"imap-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"imap-devel-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", reference:\"imap-utils-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64c-client-php-devel-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"x86_64\", reference:\"lib64c-client-php0-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libc-client-php-devel-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2008.0\", cpu:\"i386\", reference:\"libc-client-php0-2006j-1.1mdv2008.0\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-11-11T13:29:33", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5005", "CVE-2008-5006"], "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1685-1 security@debian.org\nhttp://www.debian.org/security/ Steffen Joeris\nDecember 12, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : uw-imap\nVulnerability : buffer overflows, null pointer dereference\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2008-5005 CVE-2008-5006\n\nTwo vulnerabilities have been found in uw-imap, an IMAP\nimplementation. The Common Vulnerabilities and Exposures project\nidentifies the following problems:\n\nIt was discovered that several buffer overflows can be triggered via a\nlong folder extension argument to the tmail or dmail program. This\ncould lead to arbitrary code execution (CVE-2008-5005).\n\nIt was discovered that a NULL pointer dereference could be triggered by\na malicious response to the QUIT command leading to a denial of service\n(CVE-2008-5006).\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 2002edebian1-13.1+etch1.\n\nFor the unstable distribution (sid) and the testing distribution\n(lenny), these problems have been fixed in version 2007d~dfsg-1.\n\nWe recommend that you upgrade your uw-imap packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imap_2002edebian1.orig.tar.gz\n Size/MD5 checksum: 1517069 8ff277e7831326988d0ee0bfeca7c8ff\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imap_2002edebian1-13.1+etch1.dsc\n Size/MD5 checksum: 874 ac3703de07e1cf10e7aa72a10a5fb20b\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imap_2002edebian1-13.1+etch1.diff.gz\n Size/MD5 checksum: 99906 6c0172a213d199583e0d6c1dc5957a20\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd-ssl_2002edebian1-13.1+etch1_all.deb\n Size/MD5 checksum: 20760 b418a43ee29d858752497a83897588c9\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd-ssl_2002edebian1-13.1+etch1_all.deb\n Size/MD5 checksum: 20756 4381ee8fe7865bc2fbf4f83f44ddd0e3\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_alpha.deb\n Size/MD5 checksum: 50618 972cf2d773feb8547ba6cc0bd933dbea\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_alpha.deb\n Size/MD5 checksum: 650718 1d084bff43e5efde07706f8b54134625\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_alpha.deb\n Size/MD5 checksum: 47364 d1550ecb166961b3dd7c948fd7333e18\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_alpha.deb\n Size/MD5 checksum: 26688 9a2ed6fd202bd4b7dfbd555170664979\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_alpha.deb\n Size/MD5 checksum: 80168 d26aa9867204cbc27107bc0eb046649a\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_alpha.deb\n Size/MD5 checksum: 1196482 41dba8f6a0cc1b7c602060ddf3dae58c\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_amd64.deb\n Size/MD5 checksum: 1040748 89a2bb86ee48bbc3ce0ce6ac06736e5d\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_amd64.deb\n Size/MD5 checksum: 76348 e2506d3191e383e511b73851f7b2403d\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_amd64.deb\n Size/MD5 checksum: 50416 9db96b845240094cb130050463e5b8da\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_amd64.deb\n Size/MD5 checksum: 606040 458cf8d820a650978eed89b234c2d018\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_amd64.deb\n Size/MD5 checksum: 46470 a6f2e3922fdd861d7209635ffc03b35b\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_amd64.deb\n Size/MD5 checksum: 26394 847986887b14d0a038057478d2b30872\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_arm.deb\n Size/MD5 checksum: 46642 b0e4a64cf30e20dc069e3a57259235ce\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_arm.deb\n Size/MD5 checksum: 75798 b41386db73222899258e743a33c4f639\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_arm.deb\n Size/MD5 checksum: 959814 d4589284f56b8e5746495c7ffb107a91\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_arm.deb\n Size/MD5 checksum: 589126 91754725dff8d6cea245b24af8b963bb\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_arm.deb\n Size/MD5 checksum: 26082 fbe01ef72a463c603ee2802d5a83c863\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_arm.deb\n Size/MD5 checksum: 46566 f8e9a765ce2398f1361b2a3d23fc68ae\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_hppa.deb\n Size/MD5 checksum: 49834 38e164bb266c4ac2b64efb1823520ad2\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_hppa.deb\n Size/MD5 checksum: 26948 859538b21ee583afd0eae0fe23f5ccec\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_hppa.deb\n Size/MD5 checksum: 48276 fc635c859779ac21c7f3b5e1330ac96e\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_hppa.deb\n Size/MD5 checksum: 78030 13a4830e58146dada9a4312ea1c0878e\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_hppa.deb\n Size/MD5 checksum: 1122112 6816e9ad9b34393fdc0a2a13d5e6c03a\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_hppa.deb\n Size/MD5 checksum: 638360 a22f4b8a0309cb3f7f24281c4b180c40\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_i386.deb\n Size/MD5 checksum: 26270 918de156aad623e201675f53e5a7390b\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_i386.deb\n Size/MD5 checksum: 47736 635d0586f0067de7051a7b96da96489b\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_i386.deb\n Size/MD5 checksum: 73758 92a54d90386b2d791e7833491b1a16e1\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_i386.deb\n Size/MD5 checksum: 976232 eda1d42fcf0a044eaf7b761090d203ef\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_i386.deb\n Size/MD5 checksum: 598438 10c608db26e0313c24fa806ac841e47e\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_i386.deb\n Size/MD5 checksum: 45742 53defc689a358a10ecc885846c42f2bd\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_ia64.deb\n Size/MD5 checksum: 54828 10f59379b3b9710afca1ac83ca409ce8\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_ia64.deb\n Size/MD5 checksum: 89592 8981c9ce87c1a854e986c84ac0284b90\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_ia64.deb\n Size/MD5 checksum: 1205586 6fe1eb318b9c51cc4ce7dce1c0c2d01e\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_ia64.deb\n Size/MD5 checksum: 27648 bb12979a5cf7ff84e0f233167e994b8c\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_ia64.deb\n Size/MD5 checksum: 62708 d601a2d1ef511702fd31c9953abc2dd0\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_ia64.deb\n Size/MD5 checksum: 744690 33ddf81a4b04fe817c95c1f4e828d3d4\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_mips.deb\n Size/MD5 checksum: 1103000 12bfd3f9698096d667d5623c246b17f6\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_mips.deb\n Size/MD5 checksum: 74734 a88fe50a66f89f4620cc88f0902d384e\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_mips.deb\n Size/MD5 checksum: 47006 3b171e1e0d591d05191e187154600ae0\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_mips.deb\n Size/MD5 checksum: 45228 f28bf5c2fb4ca704d151e07ddeb0b14c\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_mips.deb\n Size/MD5 checksum: 606472 919acee3427f101ad7d929611c7b1fa7\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_mips.deb\n Size/MD5 checksum: 26006 c8b6b70bcaf09ca353cfcec8030c51ab\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_mipsel.deb\n Size/MD5 checksum: 26482 8a3e4fa1b89f5948ea5647fb56f01faf\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_mipsel.deb\n Size/MD5 checksum: 74914 b6aa38a2f191d317d2d4509670fa9337\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_mipsel.deb\n Size/MD5 checksum: 1078056 103f0633e98faa29517a63c827109bc5\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_mipsel.deb\n Size/MD5 checksum: 47642 5cc42be0a5dc83fd8ca5b66cf422a974\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_mipsel.deb\n Size/MD5 checksum: 605734 f0de3efdd6f797910ac856c624ec109e\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_mipsel.deb\n Size/MD5 checksum: 46028 1ba982a87d77197645a543dc8b27b6a7\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_powerpc.deb\n Size/MD5 checksum: 50206 f4fde759040b7520e72adeea14dd7587\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_powerpc.deb\n Size/MD5 checksum: 74158 b945eea07eec4357825cfc16fed7bf4e\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_powerpc.deb\n Size/MD5 checksum: 605242 5914dedf470cfd20024c20224290e3b0\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_powerpc.deb\n Size/MD5 checksum: 26410 2c7881339151f91143572bdf7af420dd\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_powerpc.deb\n Size/MD5 checksum: 47642 ad645882db05a4d3fa1080c181eece39\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_powerpc.deb\n Size/MD5 checksum: 1109820 d5e5f0f48b8edee35e29354119b7d2a3\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_s390.deb\n Size/MD5 checksum: 623664 c635c4b77cef027eb42faef8e6727c59\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_s390.deb\n Size/MD5 checksum: 78150 b5a7a33230a9162e2308446b45466284\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_s390.deb\n Size/MD5 checksum: 26540 d45c1a7782161483c37a7e00c8fdc700\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_s390.deb\n Size/MD5 checksum: 48374 1fd3a101cd59eb59abec32014c397c18\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_s390.deb\n Size/MD5 checksum: 49490 7ea6ec2d1d99af8ac12a9fee77e3027d\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_s390.deb\n Size/MD5 checksum: 1109484 0fac4ece552d53c1e5c36d39539c7947\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-mailutils_2002edebian1-13.1+etch1_sparc.deb\n Size/MD5 checksum: 47416 51529ae793ae7f166c47fb2e23a0413e\n http://security.debian.org/pool/updates/main/u/uw-imap/ipopd_2002edebian1-13.1+etch1_sparc.deb\n Size/MD5 checksum: 46480 81c03a62740ad668f8c008b1a71be6ab\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client-dev_2002edebian1-13.1+etch1_sparc.deb\n Size/MD5 checksum: 967750 8edd729d4e4a9380764efc693b1d50ad\n http://security.debian.org/pool/updates/main/u/uw-imap/mlock_2002edebian1-13.1+etch1_sparc.deb\n Size/MD5 checksum: 26334 1dc5709d6db104eaf92e327b90b55130\n http://security.debian.org/pool/updates/main/u/uw-imap/libc-client2002edebian_2002edebian1-13.1+etch1_sparc.deb\n Size/MD5 checksum: 596486 3c3eb2be8fb28c59de0d2bb090e0e5b9\n http://security.debian.org/pool/updates/main/u/uw-imap/uw-imapd_2002edebian1-13.1+etch1_sparc.deb\n Size/MD5 checksum: 74884 39b9e029302ff6eebe08a731882181da\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n", "edition": 7, "modified": "2008-12-12T06:36:41", "published": "2008-12-12T06:36:41", "id": "DEBIAN:DSA-1685-1:465D1", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00277.html", "title": "[SECURITY] [DSA 1685-1] New uw-imap packages fix multiple vulnerabilities", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-11T13:27:17", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5005", "CVE-2008-5514", "CVE-2008-5006"], "description": "Magnus Holmgren uploaded new packages for uw-imap which fixed the\nfollowing security problems:\n\nCVE-2008-5005\n\n Multiple stack-based buffer overflows in (1) University of Washington\n IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine\n 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain\n privileges by specifying a long folder extension argument on the\n command line to the tmail or dmail program; and (b) remote attackers\n to execute arbitrary code by sending e-mail to a destination mailbox\n name composed of a username and '+' character followed by a long\n string, processed by the tmail or possibly dmail program. \n\nCVE-2008-5006\n\n smtp.c in the c-client library in University of Washington IMAP\n Toolkit 2007b allows remote SMTP servers to cause a denial of service\n (NULL pointer dereference and application crash) by responding to the\n QUIT command with a close of the TCP connection instead of the\n expected 221 response code. \n\nCVE-2008-5514\n\n Off-by-one error in the rfc822_output_char function in the\n RFC822BUFFER routines in the University of Washington (UW) c-client\n library, as used by the UW IMAP toolkit before imap-2007e and other\n applications, allows context-dependent attackers to cause a denial of\n service (crash) via an e-mail message that triggers a buffer overflow. \n\nFor the etch-backports distribution the problems have been fixed in\nversion 7:2007b~dfsg-4+lenny3~bpo40+1.\n\nFor the lenny distribution the problems have been fixed in version\n7:2007b~dfsg-4+lenny3.\n\nFor the sid distribution the problems have been fixed in version\n7:2007d~dfsg-1.\n\n\nUpgrade instructions\n--------------------\n\nIf you don't use pinning (see [1]) you have to update the packages\nmanually via "apt-get -t etch-backports install <packagelist>" with the\npackagelist of your installed packages affected by this update.\n[1] <http://backports.org/dokuwiki/doku.php?id=instructions>\n\nWe recommend to pin the backports repository to 200 so that new versions\nof installed backports will be installed automatically:\n\n Package: *\n Pin: release a=etch-backports\n Pin-Priority: 200\n", "edition": 3, "modified": "2009-01-16T07:50:23", "published": "2009-01-16T07:50:23", "id": "DEBIAN:5B037B30658E1DA2E07AD58D43DE68AC:46EEF", "href": "https://lists.debian.org/debian-backports-announce/2009/debian-backports-announce-200901/msg00001.html", "title": "[Backports-security-announce] Security Update for uw-imap", "type": "debian", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:51", "bulletinFamily": "unix", "cvelist": ["CVE-2008-5005", "CVE-2008-5514", "CVE-2008-5006"], "description": "### Background\n\nThe UW IMAP toolkit is a daemon for the IMAP and POP3 network mail protocols. The c-client library provides an API for IMAP, POP3 and other protocols. \n\n### Description\n\nMultiple vulnerabilities were found in the UW IMAP toolkit: \n\n * Aron Andersson and Jan Sahlin of Bitsec reported boundary errors in the \"tmail\" and \"dmail\" utilities when processing overly long mailbox names, leading to stack-based buffer overflows (CVE-2008-5005).\n * An error in smtp.c in the c-client library was found, leading to a NULL pointer dereference vulnerability (CVE-2008-5006).\n * Ludwig Nussel reported an off-by-one error in the rfc822_output_char() function in the RFC822BUFFER routines in the c-client library, as used by the UW IMAP toolkit (CVE-2008-5514).\n\n### Impact\n\nA remote attacker could send an e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, possibly leading to the execution of arbitrary code. A local attacker could gain privileges by specifying a long folder extension argument to the tmail or dmail program. Furthermore, a remote attacker could send a specially crafted mail message to the UW IMAP toolkit or another daemon using the c-client library, leading to a Denial of Service. A remote SMTP server could respond to the QUIT command with a close of the TCP connection instead of the expected 221 response code, possibly leading to a Denial of Service. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll c-client library users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-libs/c-client-2007e\"\n\nAll UW IMAP toolkit users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=net-mail/uw-imap-2007e\"", "edition": 1, "modified": "2009-11-25T00:00:00", "published": "2009-11-25T00:00:00", "id": "GLSA-200911-03", "href": "https://security.gentoo.org/glsa/200911-03", "type": "gentoo", "title": "UW IMAP toolkit: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}