CVE-2005-2933 (CNNVD-200510-081)
HIGH
中文标题:
UW-IMAP邮箱名称解析溢出漏洞
英文标题:
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW...
CVSS分数:
7.5
发布时间:
2005-10-13 04:00:00
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
UW-IMAP是Linux和UNIX系统的免费IMAP服务,捆绑于各种Linux版本中。 UW-IMAP中存在缓冲区溢出漏洞,起因是没有对用户提供的值进行充分的边界检查。src/c-client/mail.c中的mail_valid_net_parse_work()函数负责从用户提供的数据中获取并验证指定的邮箱名。在解析邮箱名时存在一个错误,会导致在解析单个双引号字符后继续拷贝内存,直到找到下一个单引号字符。 成功利用这个漏洞的攻击者会以IMAP服务程序的权限执行任意代码。
英文描述:
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| university_of_washington | uw-imap | * | - | - |
cpe:2.3:a:university_of_washington:uw-imap:*:*:*:*:*:*:*:*
|
| university_of_washington | uw-imap | 2004 | - | - |
cpe:2.3:a:university_of_washington:uw-imap:2004:*:*:*:*:*:*:*
|
| university_of_washington | uw-imap | 2004a | - | - |
cpe:2.3:a:university_of_washington:uw-imap:2004a:*:*:*:*:*:*:*
|
| university_of_washington | uw-imap | 2004b | - | - |
cpe:2.3:a:university_of_washington:uw-imap:2004b:*:*:*:*:*:*:*
|
| university_of_washington | uw-imap | 2004c | - | - |
cpe:2.3:a:university_of_washington:uw-imap:2004c:*:*:*:*:*:*:*
|
| university_of_washington | uw-imap | 2004d | - | - |
cpe:2.3:a:university_of_washington:uw-imap:2004d:*:*:*:*:*:*:*
|
| university_of_washington | uw-imap | 2004e | - | - |
cpe:2.3:a:university_of_washington:uw-imap:2004e:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
MDKSA-2005:194
vendor-advisory
cve.org
访问
cve.org
RHSA-2005:850
vendor-advisory
cve.org
访问
cve.org
17950
third-party-advisory
cve.org
访问
cve.org
21252
third-party-advisory
cve.org
访问
cve.org
17276
third-party-advisory
cve.org
访问
cve.org
17148
third-party-advisory
cve.org
访问
cve.org
20222
third-party-advisory
cve.org
访问
cve.org
20210
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
18554
third-party-advisory
cve.org
访问
cve.org
47
third-party-advisory
cve.org
访问
cve.org
17152
third-party-advisory
cve.org
访问
cve.org
RHSA-2006:0276
vendor-advisory
cve.org
访问
cve.org
DSA-861
vendor-advisory
cve.org
访问
cve.org
20051004 iDEFENSE Security Advisory 10.04.05: UW-IMAP Netmailbox Name Parsing Buffer Overflow Vulnerability
mailing-list
cve.org
访问
cve.org
17062
third-party-advisory
cve.org
访问
cve.org
oval:org.mitre.oval:def:9858
vdb-entry
cve.org
访问
cve.org
20051201-01-U
vendor-advisory
cve.org
访问
cve.org
15009
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2006:0501
vendor-advisory
cve.org
访问
cve.org
RHSA-2005:848
vendor-advisory
cve.org
访问
cve.org
RHSA-2006:0549
vendor-advisory
cve.org
访问
cve.org
20951
third-party-advisory
cve.org
访问
cve.org
20051004 UW-IMAP Netmailbox Name Parsing Buffer Overflow Vulnerability
third-party-advisory
cve.org
访问
cve.org
uw-imap-mailbox-name-bo(22518)
vdb-entry
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
FLSA:170411
vendor-advisory
cve.org
访问
cve.org
19832
third-party-advisory
cve.org
访问
cve.org
20060501-01-U
vendor-advisory
cve.org
访问
cve.org
17930
third-party-advisory
cve.org
访问
cve.org
1015000
vdb-entry
cve.org
访问
cve.org
VU#933601
third-party-advisory
cve.org
访问
cve.org
GLSA-200510-10
vendor-advisory
cve.org
访问
cve.org
SSA:2005-310-06
vendor-advisory
cve.org
访问
cve.org
21564
third-party-advisory
cve.org
访问
cve.org
FLSA:184098
vendor-advisory
cve.org
访问
cve.org
MDKSA-2005:189
vendor-advisory
cve.org
访问
cve.org
17928
third-party-advisory
cve.org
访问
cve.org
17336
third-party-advisory
cve.org
访问
cve.org
ADV-2006-2685
vdb-entry
cve.org
访问
cve.org
17215
third-party-advisory
cve.org
访问
cve.org
SUSE-SR:2005:023
vendor-advisory
cve.org
访问
cve.org
17483
third-party-advisory
cve.org
访问
cve.org
CVSS评分详情
7.5
HIGH
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本:
2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-10-13 04:00:00
修改时间:
2024-08-07 22:53:29
创建时间:
2025-11-11 15:32:28
更新时间:
2025-11-11 15:49:01
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-2933 |
2025-11-11 15:17:36 | 2025-11-11 07:32:28 |
| NVD | nvd_CVE-2005-2933 |
2025-11-11 14:51:20 | 2025-11-11 07:41:14 |
| CNNVD | cnnvd_CNNVD-200510-081 |
2025-11-11 15:08:48 | 2025-11-11 07:49:01 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:01
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200510-081; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200510-081
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:14
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 7; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 7
- data_sources: ['cve'] -> ['cve', 'nvd']