2 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 37EXPL: 0

Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow. Error de superación de límite en la función rfc822_output_char en las rutinas RFC822BUFFER de las bibliotecas c-client library, de la Universidad de Washinton (UW), como las utilizadas en por el Juego de herramientas UW IMAP anteriores a imap-2007e y otras aplicaciones, permiten a atacantes, despendiendo del contexto, provocar una denegación de servicio (caída) a través de un correo electrónico, que desencadene un desbordamiento de buffer. • http://secunia.com/advisories/33275 http://secunia.com/advisories/33638 http://securitytracker.com/id?1021485 http://www.mandriva.com/security/advisories?name=MDVSA-2009:146 http://www.securityfocus.com/bid/32958 http://www.vupen.com/english/advisories/2008/3490 http://www.washington.edu/imap/documentation/RELNOTES.html https://bugzilla.redhat.com/show_bug.cgi?id=477227 https://exchange.xforce.ibmcloud.com/vulnerabilities/47526 https://www.redhat.com/archives/fedora-package-announce/2009&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 11%CPEs: 8EXPL: 1

Buffer overflow in University of Washington's implementation of IMAP and POP servers. • https://www.exploit-db.com/exploits/340 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042 •