CVE-2004-1067
CVSS10.0
发布时间 :2005-01-10 00:00:00
修订时间 :2016-10-17 22:51:07
NMCO    

[原文]Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.


[CNNVD]CyrusIMAPServer mysasl_canon_user 缓冲区溢出漏洞(CNNVD-200501-185)

        Cyrus IMAPD是一款开源的IMAP协议实现软件。
        Cyrus IMAP Server 2.2.9及之前版本中mysasl_canon_user函数存在缓冲区溢出漏洞。
        远程攻击者可以利用这个漏洞,通过畸形的username字段,触发溢出,执行任意指令。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:redhat:fedora_core:core_2.0
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta
cpe:/o:ubuntu:ubuntu_linux:4.1::ppc
cpe:/o:redhat:fedora_core:core_3.0
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.8
cpe:/a:carnegie_mellon_university:cyrus_imap_server:1.5.19
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.9
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.9
cpe:/o:ubuntu:ubuntu_linux:4.1::ia64
cpe:/a:carnegie_mellon_university:cyrus_imap_server:1.4
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.16
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.7
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.3
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.6
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.0.12
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.1.10
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.4
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.7
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.0.16
cpe:/a:carnegie_mellon_university:cyrus_imap_server:2.2.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1067
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1067
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-185
(官方数据源) CNNVD

- 其它链接及资源

http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
(UNKNOWN)  CONFIRM  http://asg.web.cmu.edu/cyrus/download/imapd/changes.html
http://marc.info/?l=bugtraq&m=110202757008916&w=2
(UNKNOWN)  UBUNTU  USN-37-1
http://www.securityfocus.com/bid/11738
(VENDOR_ADVISORY)  BID  11738
http://xforce.iss.net/xforce/xfdb/18333
(VENDOR_ADVISORY)  XF  cyrus-mysaslcanonuser-offbyone-bo(18333)

- 漏洞信息

CyrusIMAPServer mysasl_canon_user 缓冲区溢出漏洞
危急 缓冲区溢出
2005-01-10 00:00:00 2005-10-20 00:00:00
远程  
        Cyrus IMAPD是一款开源的IMAP协议实现软件。
        Cyrus IMAP Server 2.2.9及之前版本中mysasl_canon_user函数存在缓冲区溢出漏洞。
        远程攻击者可以利用这个漏洞,通过畸形的username字段,触发溢出,执行任意指令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://cyrusimap.web.cmu.edu/downloads.html

- 漏洞信息

12348
Cyrus IMAP Server mysasl_canon_user() Function Remote Overflow
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2004-12-02 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站