7 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Cyrus IMAP before 3.4.2 allows remote attackers to cause a denial of service (multiple-minute daemon hang) via input that is mishandled during hash-table interaction. Because there are many insertions into a single bucket, strcmp becomes slow. This is fixed in 3.4.2, 3.2.8, and 3.0.16. Cyrus IMAP versiones anteriores a 3.4.2, permite a atacantes remotos causar una denegación de servicio (cuelgue del demonio de varios minutos) por medio de una entrada manejada inapropiadamente durante la interacción de la tabla hash. Debido a que presenta muchas inserciones en un solo cubo, strcmp se vuelve lento. • https://cyrus.topicbox.com/groups/announce/T3dde0a2352462975-M1386fc44adf967e072f8df13/cyrus-imap-3-4-2-3-2-8-and-3-0-16-released https://github.com/cyrusimap/cyrus-imapd/commits/master https://github.com/cyrusimap/cyrus-imapd/security/advisories https://lists.debian.org/debian-lts-announce/2022/06/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HEO3RURJW6NLIXS7NK5PVU6MGHC4SCM https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org • CWE-400: Uncontrolled Resource Consumption CWE-407: Inefficient Algorithmic Complexity •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Cyrus IMAP before 3.2.7, and 3.3.x and 3.4.x before 3.4.1, allows remote authenticated users to bypass intended access restrictions on server annotations and consequently cause replication to stall. Cyrus IMAP versiones anteriores a 3.2.7, y versiones 3.3.x y versiones 3.4.x anteriores a 3.4.1, permite a usuarios autenticados remotos omitir las restricciones de acceso previstas en las anotaciones del servidor y, en consecuencia, provocar que la replicación se detenga • https://cyrus.topicbox.com/groups/announce/T056901c106ecfce3/cyrus-imap-3-4-1-released https://cyrus.topicbox.com/groups/announce/T126392718bc29d6b/cyrus-imap-3-2-7-released https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HEO3RURJW6NLIXS7NK5PVU6MGHC4SCM https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WJZB45QBUN7CZFGOWCZYUYACNBTX7LVS https://www.cyrusimap.org/imap/download/release-notes/3.2/x/3.2.7.html https://www.cyrusimap.org/ • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

In the mboxlist_do_find function in imap/mboxlist.c in Cyrus IMAP before 3.0.4, an off-by-one error in prefix calculation for the LIST command caused use of uninitialized memory, which might allow remote attackers to obtain sensitive information or cause a denial of service (daemon crash) via a 'LIST "" "Other Users"' command. En la función mboxlist_do_find en imap/mboxlist.c en Cyrus IMAP en versiones anteriores a la 3.0.4, un error por un paso (off-by-one) en el cálculo de prefijos para el comando LIST provocaba el uso de memoria sin inicializar, lo que podría permitir que atacantes remotos obtengan información sensible o provoquen una denegación de servicio (daemon crash) mediante un comando 'LIST "" "Other Users"'. • https://github.com/cyrusimap/cyrus-imapd/commit/6bd33275368edfa71ae117de895488584678ac79 https://github.com/cyrusimap/cyrus-imapd/issues/2132 https://lists.andrew.cmu.edu/pipermail/cyrus-announce/2017-September/000145.html https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.4.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076. Desbordamiento de entero en la función index_urlfetch en imap/index.c en Cyrus IMAP 2.3.19, 2.4.18 y 2.5.6 permite a atacantes remotos tener un impacto no especificado a través de vectores relacionados con comprobaciones del intervalo urlfetch y la variable section_offset. NOTA: esta vulnerabilidad existe debido a una solución incompleta de la CVE-2015-8076. • http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html http://www.openwall.com/lists/oss-security/2015/11/04/3 http://www.securitytracker.com/id/1034282 https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2 https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

The index_urlfetch function in index.c in Cyrus IMAP 2.3.x before 2.3.19, 2.4.x before 2.4.18, 2.5.x before 2.5.4 allows remote attackers to obtain sensitive information or possibly have unspecified other impact via vectors related to the urlfetch range, which triggers an out-of-bounds heap read. La función index_urlfetch en index.c en Cyrus IMAP 2.3.x en versiones anteriores a 2.3.19, 2.4.x en versiones anteriores a 2.4.18, 2.5.x en versiones anteriores a 2.5.4 permite a atacantes remotos obtener información sensible o posiblemente tener otro impacto no especificado a través de vectores relacionados con el intervalo urlfetch, lo que desencadena una lectura de memoria dinámica fuera de rango. • http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html http://lists.opensuse.org/opensuse-updates/2015-09/msg00037.html http://lists.opensuse.org/opensuse-updates/2015-09/msg00038.html http://www.openwall.com/lists/oss-security/2015/09/29/2 http://www.openwall.com/lists/oss-security/2015/09/30/3 http://www.openwall.com/lists/oss-security/2015/11/04/3 https://cyrus.foundation/cyru • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •