University of Washington IMAP up to 2007d C-Client Library rfc822_output_char memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.8 | $0-$5k | 0.00 |
A vulnerability was found in University of Washington IMAP and classified as critical. This issue affects the function rfc822_output_char
of the component C-Client Library. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. Impacted is availability. The summary by CVE is:
Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.
The bug was discovered 12/16/2008. The weakness was published 12/23/2008 by Ludwig Nussel (Website). It is possible to read the advisory at redhat.com. The identification of this vulnerability is CVE-2008-5514 since 12/12/2008. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 7 days. During that time the estimated underground price was around $0-$5k. The vulnerability scanner Nessus provides a plugin with the ID 35338 (FreeBSD : imap-uw -- imap c-client buffer overflow (69a20ce4-dfee-11dd-a765-0030843d3802)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family FreeBSD Local Security Checks and running in the context l.
Upgrading to version 2004 eliminates this vulnerability. A possible mitigation has been published 3 weeks after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (47526) and Tenable (35338). Similar entries are available at VDB-19967 and VDB-44952.
Product
Vendor
Name
Version
- 2000
- 2000a
- 2000b
- 2000c
- 2001
- 2001a
- 2002
- 2002a
- 2002b
- 2002c
- 2002d
- 2002e
- 2002f
- 2004
- 2004a
- 2004b
- 2004c
- 2004d
- 2004e
- 2004f
- 2004g
- 2006
- 2006a
- 2006b
- 2006c
- 2006d
- 2006e
- 2006f
- 2006g
- 2006h
- 2006i
- 2006j
- 2006k
- 2007
- 2007a
- 2007b
- 2007d
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 35338
Nessus Name: FreeBSD : imap-uw -- imap c-client buffer overflow (69a20ce4-dfee-11dd-a765-0030843d3802)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Nessus Port: 🔍
OpenVAS ID: 63264
OpenVAS Name: Fedora Core 9 FEDORA-2009-0371 (uw-imap)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: IMAP 2004
Timeline
12/12/2008 🔍12/16/2008 🔍
12/16/2008 🔍
12/16/2008 🔍
12/22/2008 🔍
12/23/2008 🔍
12/23/2008 🔍
12/28/2008 🔍
01/11/2009 🔍
01/12/2009 🔍
03/17/2015 🔍
08/22/2019 🔍
Sources
Vendor: washington.eduAdvisory: redhat.com
Researcher: Ludwig Nussel
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2008-5514 (🔍)
X-Force: 47526
SecurityTracker: 1021485
Vulnerability Center: 20339 - University of Washington c-client Library in IMAP Toolkit < 2007e Remote DoS via an E-Mail Message, Medium
SecurityFocus: 32958 - University of Washington IMAP c-client Buffer Overflow Vulnerability
Secunia: 33275
OSVDB: 52905 - University of Washington - IMAP - c-client Buffer Overflow Issue
Vupen: ADV-2008-3490
See also: 🔍
Entry
Created: 03/17/2015 16:11Updated: 08/22/2019 21:01
Changes: 03/17/2015 16:11 (75), 08/22/2019 21:01 (12)
Complete: 🔍
Cache ID: 3:60E:103
No comments yet. Languages: en.
Please log in to comment.