![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-3208 – cyrus-imapd: nntpd buffer overflow in split_wildmats()
https://notcve.org/view.php?id=CVE-2011-3208
14 Sep 2011 — Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command. Desbordamiento de búfer basado en la pila en la función split_wildmats en nntpd.c en nntpd en el servidor Cyrus IMAP antes de la verison v2.3.17 y en v2.4.x antes de v2.4.11 permite a atacantes remotos ejecutar código de su elección mediante un comando NNTP debidamente modificado. • http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-3481 – cyrus-imapd: NULL pointer dereference via crafted References header in email
https://notcve.org/view.php?id=CVE-2011-3481
14 Sep 2011 — The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message. La función index_get_ids en index.c en imapd del Servidor Cyrus IMAP antes de la versión v2.4.11, cuando multihilo en elado del servidor está activado, permite a atacantes remotos causar una denegación de servicio (puntero a NULL y caída d... • http://bugzilla.cyrusimap.org/show_bug.cgi?id=2772 • CWE-476: NULL Pointer Dereference •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2011-1926 – cyrus-imapd: STARTTLS plaintext command injection
https://notcve.org/view.php?id=CVE-2011-1926
23 May 2011 — The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411. La implementación STARTTLS en Cyrus IMAP Server anterior a v2.4.7 no restringe adecuadamente el búfer de Entrada/Salida, lo que permite ataques "man-in-the-middle" par... • http://bugzilla.cyrusimap.org/show_bug.cgi?id=3423 • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1067
https://notcve.org/view.php?id=CVE-2004-1067
10 Dec 2004 — Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username. Error de fuera-por-uno en la función myasl_canon_user en Cyrus IMAP Server 2.2.9 y anteriores conduce a un desbordamiento de búfer, lo que puede permitir a atacantes remotos ejecutar código de su elección mediante el nombre de usuario. • http://asg.web.cmu.edu/cyrus/download/imapd/changes.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1013
https://notcve.org/view.php?id=CVE-2004-1013
01 Dec 2004 — The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) "body[p", (2) "bina... • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1012
https://notcve.org/view.php?id=CVE-2004-1012
01 Dec 2004 — The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden ("body[p") ... • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1011
https://notcve.org/view.php?id=CVE-2004-1011
01 Dec 2004 — Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015. Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1015
https://notcve.org/view.php?id=CVE-2004-1015
01 Dec 2004 — Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011. Desbordamiento de búfer en proxyd de Cyrus IMAP Server 2.2.9 y anteriores, con la opción imapmagicplus establecida, puede permitir a atacantes remotos ejecutar código de su elección, una vulnerabilidad distinta de CAN-2004-1011. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145 •