uw-imap is vulnerable to remote overflow of a buffer in the IMAP server leading to execution of arbitrary code.
Package | net-mail/uw-imap on all architectures |
---|---|
Affected versions | < 2004g |
Unaffected versions | >= 2004g |
uw-imap is the University of Washington's IMAP and POP server daemons.
Improper bounds checking of user supplied data while parsing IMAP mailbox names can lead to overflowing the stack buffer.
Successful exploitation requires an authenticated IMAP user to request a malformed mailbox name. This can lead to execution of arbitrary code with the permissions of the IMAP server.
There are no known workarounds at this time.
All uw-imap users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004g"
Release date
October 11, 2005
Latest revision
October 11, 2005: 01
Severity
high
Exploitable
remote
Bugzilla entries