Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Courier-imap | Inter7 | 1.6 (including) | 1.6 (including) |
Courier-imap | Inter7 | 1.7 (including) | 1.7 (including) |
Courier-imap | Inter7 | 2.0.0 (including) | 2.0.0 (including) |
Courier-imap | Inter7 | 2.1 (including) | 2.1 (including) |
Courier-imap | Inter7 | 2.1.1 (including) | 2.1.1 (including) |
Courier-imap | Inter7 | 2.1.2 (including) | 2.1.2 (including) |
Courier-imap | Inter7 | 2.2.0 (including) | 2.2.0 (including) |
Courier-imap | Inter7 | 2.2.1 (including) | 2.2.1 (including) |