
CVE-2004-1067
https://notcve.org/view.php?id=CVE-2004-1067
10 Dec 2004 — Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username. Error de fuera-por-uno en la función myasl_canon_user en Cyrus IMAP Server 2.2.9 y anteriores conduce a un desbordamiento de búfer, lo que puede permitir a atacantes remotos ejecutar código de su elección mediante el nombre de usuario. • http://asg.web.cmu.edu/cyrus/download/imapd/changes.html •

CVE-2004-1011
https://notcve.org/view.php?id=CVE-2004-1011
01 Dec 2004 — Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015. Desbordamiento basado en la pila en Cyrus IMAP Server 2.2.4 a 2.2.8, con la opción imapmagicplus establecida, permite a atacantes remotos ejecuta código de su elección mediante un comando PROXY o LOGIN largo, una vulnerabilidad distinta de CAN-2004-1015. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 •

CVE-2004-1012
https://notcve.org/view.php?id=CVE-2004-1012
01 Dec 2004 — The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden PARTIAL de Cyrus IMAP Server 2.2.6 y anteriores permite a usuarios remotos autentificados ejecutar código de su elección mediante una cierta orden ("body[p") ... • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 •

CVE-2004-1013
https://notcve.org/view.php?id=CVE-2004-1013
01 Dec 2004 — The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption. El procesador de argumentos de la orden FETCH de Cyrus IMAP Server 2.2.x a 2.2.8 permite a usuarios remotos autenticados ejecutar código de su elección mediante ciertos comandos como (1) "body[p", (2) "bina... • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=143 •

CVE-2004-1015
https://notcve.org/view.php?id=CVE-2004-1015
01 Dec 2004 — Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011. Desbordamiento de búfer en proxyd de Cyrus IMAP Server 2.2.9 y anteriores, con la opción imapmagicplus establecida, puede permitir a atacantes remotos ejecutar código de su elección, una vulnerabilidad distinta de CAN-2004-1011. • http://asg.web.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=145 •

CVE-2002-1580 – Cyrus IMAPD 1.4/1.5.19/2.0.12/2.0.16/2.1.9/2.1.10 - Pre-Login Heap Corruption
https://notcve.org/view.php?id=CVE-2002-1580
20 May 2004 — Integer overflow in imapparse.c for Cyrus IMAP server 1.4 and 2.1.10 allows remote attackers to execute arbitrary code via a large length value that facilitates a buffer overflow attack, a different vulnerability than CVE-2002-1347. Desbordamiento de enteros en imapparse.c de Cyrus IMAP server 1.4 y 2.1.10 permite a atacantes remotos ejecutar código arbitrario mediante un valor de longitud grande que facilita un ataque de desbordamiento de búfer, una vulnerabilidad distinta de CAN-2002-1347. • https://www.exploit-db.com/exploits/22061 •

CVE-2001-1154
https://notcve.org/view.php?id=CVE-2001-1154
30 Aug 2001 — Cyrus 2.0.15, 2.0.16, and 1.6.24 on BSDi 4.2, with IMAP enabled, allows remote attackers to cause a denial of service (hang) using PHP IMAP clients. • http://www.securityfocus.com/archive/1/211056 •