CVE Vulnerabilities

CVE-2005-2933

Published: Oct 13, 2005 | Modified: Apr 03, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washingtons IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote () character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.

Affected Software

NameVendorStart VersionEnd Version
Uw-imapUniversity_of_washington*2004f (including)
Uw-imapUniversity_of_washington2004 (including)2004 (including)
Uw-imapUniversity_of_washington2004a (including)2004a (including)
Uw-imapUniversity_of_washington2004b (including)2004b (including)
Uw-imapUniversity_of_washington2004c (including)2004c (including)
Uw-imapUniversity_of_washington2004d (including)2004d (including)
Uw-imapUniversity_of_washington2004e (including)2004e (including)
Red Hat Enterprise Linux 3RedHatimap-1:2002d-12*
Red Hat Enterprise Linux 3RedHatphp-0:4.3.2-30.ent*
Red Hat Enterprise Linux 4RedHatlibc-client-0:2002e-14*
Red Hat Enterprise Linux 4RedHatphp-0:4.3.9-3.12*
Red Hat Enterprise Linux AS (Advanced Server) version 2.1RedHat*
Red Hat Enterprise Linux ES version 2.1RedHat*
Red Hat Enterprise Linux WS version 2.1RedHat*
Red Hat Linux Advanced Workstation 2.1RedHat*
Stronghold 4.0 for Red Hat Enterprise Linux AS (version 2.1)RedHat*
Uw-imapUbuntudapper*
Uw-imapUbuntudevel*
Uw-imapUbuntuedgy*
Uw-imapUbuntufeisty*

References