Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
References
Link Providers
http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002267.html cve-icon cve-icon
http://mailman2.u.washington.edu/pipermail/imap-uw/2008-October/002268.html cve-icon cve-icon
http://marc.info/?l=full-disclosure&m=122572590212610&w=4 cve-icon cve-icon
http://panda.com/imap/ cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2009-0275.html cve-icon cve-icon
http://secunia.com/advisories/32483 cve-icon cve-icon
http://secunia.com/advisories/32512 cve-icon cve-icon
http://secunia.com/advisories/33142 cve-icon cve-icon
http://secunia.com/advisories/33996 cve-icon cve-icon
http://securityreason.com/securityalert/4570 cve-icon cve-icon
http://securitytracker.com/id?1021131 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2009-065.htm cve-icon cve-icon
http://www.bitsec.com/en/rad/bsa-081103.c cve-icon cve-icon
http://www.bitsec.com/en/rad/bsa-081103.txt cve-icon cve-icon
http://www.debian.org/security/2008/dsa-1685 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:146 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2008/11/03/3 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2008/11/03/4 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2008/11/03/5 cve-icon cve-icon
http://www.securityfocus.com/archive/1/498002/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/32072 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/3042 cve-icon cve-icon
http://www.washington.edu/alpine/tmailbug.html cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=469667 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/46281 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2008-5005 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10485 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2008-5005 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00058.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00082.html cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2008-11-10T11:00:00

Updated: 2024-08-07T10:40:16.768Z

Reserved: 2008-11-10T00:00:00

Link: CVE-2008-5005

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-11-10T14:12:56.140

Modified: 2024-02-14T01:17:43.863

Link: CVE-2008-5005

cve-icon Redhat

Severity : Moderate

Publid Date: 2008-10-31T00:00:00Z

Links: CVE-2008-5005 - Bugzilla