CVE-2008-5005

CVSS V2 High 10 CVSS V3 None
Description
Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
Overview
  • CVE ID
  • CVE-2008-5005
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-11-10T14:12:56
  • Last Modified Date
  • 2018-10-11T20:53:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:university_of_washington:alpine:0.80:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.81:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.82:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.83:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.98:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.99:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.999:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.9999:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.99999:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:0.999999:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:1.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:alpine:2.00:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2002:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2003:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2004:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2005:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2006:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2007:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:university_of_washington:imap_toolkit:2007c:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://www.openwall.com/lists/oss-security/2008/11/03/5
https://bugzilla.redhat.com/show_bug.cgi?id=469667 Patch
http://securitytracker.com/id?1021131
http://www.openwall.com/lists/oss-security/2008/11/03/3
http://panda.com/imap/
http://www.openwall.com/lists/oss-security/2008/11/03/4
http://www.bitsec.com/en/rad/bsa-081103.txt
http://www.bitsec.com/en/rad/bsa-081103.c
http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002268.html
http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html Patch
http://secunia.com/advisories/32483 Vendor Advisory
http://marc.info/?l=full-disclosure&m=122572590212610&w=4
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00058.html
http://secunia.com/advisories/32512
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00082.html
http://www.debian.org/security/2008/dsa-1685
http://secunia.com/advisories/33142
http://securityreason.com/securityalert/4570
http://secunia.com/advisories/33996
http://www.washington.edu/alpine/tmailbug.html
http://rhn.redhat.com/errata/RHSA-2009-0275.html
http://www.securityfocus.com/bid/32072
http://support.avaya.com/elmodocs2/security/ASA-2009-065.htm
http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
http://www.vupen.com/english/advisories/2008/3042
https://exchange.xforce.ibmcloud.com/vulnerabilities/46281
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10485
http://www.securityfocus.com/archive/1/498002/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:27:37 Added to TrackCVE