CVE-2004-1067

Current Description

Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.

Basic Data

PublishedJanuary 10, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server1.4*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server1.5.19*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.0.12*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.0.16*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.1.7*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.1.9*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.1.10*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.1.16*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.0_alpha*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.1_beta*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.2_beta*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.3*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.4*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.5*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.6*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.7*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.8*******
    2.3ApplicationCarnegie Mellon UniversityCyrus Imap Server2.2.9*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSRedhatFedora Corecore_2.0*******
    2.3OSRedhatFedora Corecore_3.0*******
    2.3OSUbuntuUbuntu Linux4.1*ia64*****
    2.3OSUbuntuUbuntu Linux4.1*ppc*****

Vulnerable Software List

VendorProductVersions
Redhat Fedora Core core_2.0, core_3.0
Ubuntu Ubuntu Linux 4.1
Carnegie Mellon University Cyrus Imap Server 1.4, 1.5.19, 2.0.12, 2.0.16, 2.1.10, 2.1.16, 2.1.7, 2.1.9, 2.2.0_alpha, 2.2.1_beta, 2.2.2_beta, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9

References

NameSourceURLTags
http://asg.web.cmu.edu/cyrus/download/imapd/changes.htmlhttp://asg.web.cmu.edu/cyrus/download/imapd/changes.htmlCONFIRM
11738http://www.securityfocus.com/bid/11738BIDPatch Vendor Advisory
cyrus-mysaslcanonuser-offbyone-bo(18333)https://exchange.xforce.ibmcloud.com/vulnerabilities/18333XF
USN-37-1https://www.ubuntu.com/usn/usn-37-1/UBUNTU