Page 2 of 17 results (0.012 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

In the mboxlist_do_find function in imap/mboxlist.c in Cyrus IMAP before 3.0.4, an off-by-one error in prefix calculation for the LIST command caused use of uninitialized memory, which might allow remote attackers to obtain sensitive information or cause a denial of service (daemon crash) via a 'LIST "" "Other Users"' command. En la función mboxlist_do_find en imap/mboxlist.c en Cyrus IMAP en versiones anteriores a la 3.0.4, un error por un paso (off-by-one) en el cálculo de prefijos para el comando LIST provocaba el uso de memoria sin inicializar, lo que podría permitir que atacantes remotos obtengan información sensible o provoquen una denegación de servicio (daemon crash) mediante un comando 'LIST "" "Other Users"'. • https://github.com/cyrusimap/cyrus-imapd/commit/6bd33275368edfa71ae117de895488584678ac79 https://github.com/cyrusimap/cyrus-imapd/issues/2132 https://lists.andrew.cmu.edu/pipermail/cyrus-announce/2017-September/000145.html https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.4.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076. Desbordamiento de entero en la función index_urlfetch en imap/index.c en Cyrus IMAP 2.3.19, 2.4.18 y 2.5.6 permite a atacantes remotos tener un impacto no especificado a través de vectores relacionados con comprobaciones del intervalo urlfetch y la variable section_offset. NOTA: esta vulnerabilidad existe debido a una solución incompleta de la CVE-2015-8076. • http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html http://www.openwall.com/lists/oss-security/2015/11/04/3 http://www.securitytracker.com/id/1034282 https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2 https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

The index_urlfetch function in index.c in Cyrus IMAP 2.3.x before 2.3.19, 2.4.x before 2.4.18, 2.5.x before 2.5.4 allows remote attackers to obtain sensitive information or possibly have unspecified other impact via vectors related to the urlfetch range, which triggers an out-of-bounds heap read. La función index_urlfetch en index.c en Cyrus IMAP 2.3.x en versiones anteriores a 2.3.19, 2.4.x en versiones anteriores a 2.4.18, 2.5.x en versiones anteriores a 2.5.4 permite a atacantes remotos obtener información sensible o posiblemente tener otro impacto no especificado a través de vectores relacionados con el intervalo urlfetch, lo que desencadena una lectura de memoria dinámica fuera de rango. • http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html http://lists.opensuse.org/opensuse-updates/2015-09/msg00037.html http://lists.opensuse.org/opensuse-updates/2015-09/msg00038.html http://www.openwall.com/lists/oss-security/2015/09/29/2 http://www.openwall.com/lists/oss-security/2015/09/30/3 http://www.openwall.com/lists/oss-security/2015/11/04/3 https://cyrus.foundation/cyru • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076. Desbordamiento de entero en la función index_urlfetch en imap/index.c en Cyrus IMAP 2.3.19, 2.4.18 y 2.5.6 permite a atacantes remotos tener un impacto no especificado a través de vectores relacionados con comprobaciones del intervalo urlfetch y la variable start_octet. NOTA: esta vulnerabilidad existe debido a una solución incompleta de la CVE-2015-8076. • http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00015.html http://www.openwall.com/lists/oss-security/2015/09/30/3 http://www.openwall.com/lists/oss-security/2015/11/04/3 http://www.securitytracker.com/id/1034282 https://cyrus.foundation/cyrus-imapd/commit/?id&# • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command. imap/nntpd.c en el servidor NNTP (nntpd) para Cyrus IMAPd v2.4.x anterior a v2.4.12 permite a atacantes remotos eludir la autenticación enviando un comando AUTHINFO USER sin un comando AUTHINFO PASS adicional • http://cyrusimap.org/mediawiki/index.php/Latest_Updates http://git.cyrusimap.org/cyrus-imapd/commit/?id=77903669e04c9788460561dd0560b9c916519594 http://secunia.com/advisories/46093 http://secunia.com/secunia_research/2011-68 http://securitytracker.com/id?1026363 http://www.debian.org/security/2011/dsa-2318 http://www.mandriva.com/security/advisories?name=MDVSA-2011:149 http://www.redhat.com/support/errata/RHSA-2011-1508.html https://bugzilla.redhat.com/show_bug.cgi?id=740822 https:// • CWE-287: Improper Authentication •