exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

CVE-2008-5005

Status Candidate

Overview

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

Related Files

Mandriva Linux Security Advisory 2009-146
Posted Dec 30, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-146 - Security vulnerabilities has been identified and fixed in University of Washington IMAP Toolkit.

tags | advisory, vulnerability, imap
systems | linux, mandriva
advisories | CVE-2008-5005, CVE-2008-5006, CVE-2008-5514
SHA-256 | 7d4cf5f5853a965d4cb5684b8a5cd31bb2f6df434ea4e84c2a8c04a5925e5280
Gentoo Linux Security Advisory 200911-3
Posted Nov 25, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 200911-3 - Multiple vulnerabilities have been found in the UW IMAP toolkit and the c-client library, the worst of which leading to the execution of arbitrary code. Versions less than 2007e are affected.

tags | advisory, arbitrary, vulnerability, imap
systems | linux, gentoo
advisories | CVE-2008-5005, CVE-2008-5006, CVE-2008-5514
SHA-256 | ab9d7e8131f4629b6a10dc3c533fd0fa7d18b4d2ca3137755a0267d4b9021931
Mandriva Linux Security Advisory 2009-166
Posted Jul 28, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-166 - Security vulnerabilities have been identified and fixed in University of Washington IMAP Toolkit.

tags | advisory, vulnerability, imap
systems | linux, mandriva
advisories | CVE-2008-5005, CVE-2008-5006, CVE-2008-5514
SHA-256 | efb93b709e59a4b2cfba40c48694f2651bf24a6b31db1a0f68125f4481c3be16
Mandriva Linux Security Advisory 2009-146
Posted Jun 29, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-146 - Security vulnerabilities has been identified and fixed in University of Washington IMAP Toolkit. These include multiple stack-based buffer overflows, a pointer dereference, and an off-by-one error.

tags | advisory, overflow, vulnerability, imap
systems | linux, mandriva
advisories | CVE-2008-5005, CVE-2008-5006, CVE-2008-5514
SHA-256 | 0f0e4744a4880902a977bd7e98b528d6f3cb139957b76084a33bdf7f5e31afa5
Mandriva Linux Security Advisory 2009-064
Posted Mar 3, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-064 - Security vulnerabilities has been identified and fixed in University of Washington IMAP Toolkit which could allow local users to gain privileges by specifying incorrect folder name. The updated packages have been patched to prevent this.

tags | advisory, local, vulnerability, imap
systems | linux, mandriva
advisories | CVE-2008-5005
SHA-256 | 5faed625e4de4ed595ab21867cef59e7b9c4dceb7261b7405dc26e620ce6be46
Debian Linux Security Advisory 1685-1
Posted Dec 12, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1685-1 - Two vulnerabilities have been found in uw-imap, an IMAP implementation.

tags | advisory, vulnerability, imap
systems | linux, debian
advisories | CVE-2008-5005, CVE-2008-5006
SHA-256 | 84b627e46f32614c134ce1d28fdce2e2a2a31b0c545cdde1026a6f49f090090b
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close