CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

University Of Washington : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2008-5514 119 DoS Overflow 2008-12-23 2009-02-05
4.3
None Remote Medium Not required None None Partial
Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.
2 CVE-2008-5006 399 DoS 2008-11-10 2009-01-23
5.0
None Remote Low Not required None None Partial
smtp.c in the c-client library in University of Washington IMAP Toolkit 2007b allows remote SMTP servers to cause a denial of service (NULL pointer dereference and application crash) by responding to the QUIT command with a close of the TCP connection instead of the expected 221 response code.
3 CVE-2008-5005 119 Exec Code Overflow +Priv 2008-11-10 2010-08-21
10.0
Admin Remote Low Not required Complete Complete Complete
Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
4 CVE-2006-1394 XSS 2006-03-26 2008-09-05
4.3
None Remote Medium Not required None Partial None
Multiple cross-site scripting (XSS) vulnerabilities in the Microsoft IIS ISAPI filter (aka application server module) in University of Washington Pubcookie 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors.
5 CVE-2006-1393 XSS 2006-03-26 2008-09-05
4.3
None Remote Medium Not required None Partial None
Multiple cross-site scripting (XSS) vulnerabilities in the mod_pubcookie Apache application server module in University of Washington Pubcookie 1.x, 3.0.0, 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified attack vectors.
6 CVE-2006-1392 XSS 2006-03-26 2008-09-05
4.3
None Remote Medium Not required None Partial None
Multiple cross-site scripting (XSS) vulnerabilities in index.cgi in the login server in University of Washington Pubcookie 3.0.0, 3.1.0, 3.1.1, 3.2 before 3.2.1b, and 3.3 before 3.3.0a allow remote attackers to inject arbitrary web script or HTML via unspecified inputs.
7 CVE-2005-2933 Exec Code Overflow 2005-10-13 2010-08-21
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
8 CVE-2005-1066 2005-05-02 2008-09-05
1.2
None Local High Not required None Partial None
Race condition in rpdump in Pine 4.62 and earlier allows local users to overwrite arbitrary files via a symlink attack.
9 CVE-2005-0198 2005-05-02 2010-08-21
7.5
User Remote Low Not required Partial Partial Partial
A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.
10 CVE-2003-0721 Exec Code 2003-09-17 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Integer signedness error in rfc2231_get_param from strings.c in PINE before 4.58 allows remote attackers to execute arbitrary code via an email that causes an out-of-bounds array access using a negative number.
11 CVE-2003-0720 Exec Code Overflow 2003-09-17 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type.
12 CVE-2003-0300 DoS Overflow 2003-06-16 2008-09-05
5.0
None Remote Low Not required None None Partial
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
13 CVE-2003-0297 DoS Exec Code Overflow 2003-06-16 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
c-client IMAP Client, as used in imap-2002b and Pine 4.53, allows remote malicious IMAP servers to cause a denial of service (crash) and possibly execute arbitrary code via certain large (1) literal and (2) mailbox size values that cause either integer signedness errors or integer overflow errors.
14 CVE-2002-2325 20 DoS 2002-12-31 2008-09-05
7.8
None Remote Low Not required None None Complete
The c-client library in Internet Message Access Protocol (IMAP) dated before 2002 RC2, as used by Pine 4.20 through 4.44, allows remote attackers to cause a denial of service (client crash) via a MIME-encoded email with Content-Type header containing an empty boundary field.
15 CVE-2002-1903 +Info 2002-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
Pine 4.2.1 through 4.4.4 puts Unix usernames and/or uid into Sender: and X-Sender: headers, which could allow remote attackers to obtain sensitive information.
16 CVE-2002-1782 2002-12-31 2008-09-05
2.1
None Local Low Not required Partial None None
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
17 CVE-2002-1320 DoS 2002-12-11 2008-09-10
5.0
None Remote Low Not required None None Partial
Pine 4.44 and earlier allows remote attackers to cause a denial of service (core dump and failed restart) via an email message with a From header that contains a large number of quotation marks (").
18 CVE-2002-0379 Exec Code Overflow 2002-06-25 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
19 CVE-2002-0014 Exec Code 2002-07-26 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&).
20 CVE-2001-0736 2001-10-18 2008-09-05
2.1
None Local Low Not required None Partial None
Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack.
21 CVE-2001-0691 Exec Code Overflow 2001-09-20 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
22 CVE-2000-1197 DoS 2001-08-31 2008-09-10
2.1
None Local Low Not required None None Partial
POP2 or POP3 server (pop3d) in imap-uw IMAP package on FreeBSD and other operating systems creates lock files with predictable names, which allows local users to cause a denial of service (lack of mail access) for other users by creating lock files for other mail boxes.
23 CVE-2000-0909 Exec Code Overflow 2000-12-19 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header.
24 CVE-2000-0847 Exec Code Overflow 2000-11-14 2008-09-05
7.5
None Remote Low Not required Partial Partial Partial
Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header.
25 CVE-2000-0353 Exec Code 1999-06-28 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine.
26 CVE-2000-0352 Exec Code 1999-11-18 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL.
27 CVE-2000-0284 Exec Code Overflow 2000-04-16 2008-09-10
7.5
None Remote Low Not required Partial Partial Partial
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
28 CVE-1999-1224 1997-10-08 2008-09-05
3.6
None Local Low Not required Partial None Partial
IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information.
29 CVE-1999-1187 +Priv 1996-08-26 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail.
30 CVE-1999-0997 Exec Code 1999-12-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
31 CVE-1999-0920 Overflow +Priv 1999-05-26 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
32 CVE-1999-0202 Exec Code 1997-01-01 2010-03-26
7.5
User Remote Low Not required Partial Partial Partial
The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.
33 CVE-1999-0042 Overflow 1997-04-07 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
34 CVE-1999-0005 Exec Code Overflow 1998-07-20 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Arbitrary command execution via IMAP buffer overflow in authenticate command.
35 CVE-1999-0004 Overflow 1997-12-16 2008-09-09
5.0
None Remote Low Not required None None Partial
MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.
Total number of vulnerabilities : 35   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.