UoW imapd AUTHENTICATE Command Remote Overflow

1998-07-17T00:00:00
ID OSVDB:911
Type osvdb
Reporter OSVDB
Modified 1998-07-17T00:00:00

Description

Vulnerability Description

A remote overflow exists in the University of Washington IMAP server. The IMAP server fails to validate the argument passed to the AUTHENTICATE command resulting in a stack overflow. With a specially crafted request, an attacker can gain remote root privileges resulting in a loss of integrity.

Solution Description

Upgrade to version 12.264 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

A remote overflow exists in the University of Washington IMAP server. The IMAP server fails to validate the argument passed to the AUTHENTICATE command resulting in a stack overflow. With a specially crafted request, an attacker can gain remote root privileges resulting in a loss of integrity.

References:

Vendor Specific Advisory URL Snort Signature ID: 2105 Snort Signature ID: 1844 Nessus Plugin ID:10292 Nessus Plugin ID:10125 Mail List Post: http://www.securityfocus.com/archive/1/9929 Keyword: TCP Port 143,uw-imapd,wu-imapd,imapd-wu,uow-imapd ISS X-Force ID: 1463 Generic Exploit URL: http://packetstormsecurity.org/new-exploits/imap3.c CVE-1999-0005 CIAC Advisory: i-074 CERT: CA-1998-09 Bugtraq ID: 130