Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.
Max CVSS
4.3
EPSS Score
0.25%
Published
2008-12-23
Updated
2017-08-08
Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
Max CVSS
10.0
EPSS Score
11.78%
Published
2008-11-10
Updated
2018-10-11
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
Max CVSS
7.5
EPSS Score
38.13%
Published
2005-10-13
Updated
2018-10-19
Buffer overflow in PINE before 4.58 allows remote attackers to execute arbitrary code via a malformed message/external-body MIME type.
Max CVSS
7.5
EPSS Score
26.99%
Published
2003-09-17
Updated
2018-05-03
The IMAP Client for Sylpheed 0.8.11 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors.
Max CVSS
5.0
EPSS Score
0.46%
Published
2003-06-16
Updated
2016-10-18
c-client IMAP Client, as used in imap-2002b and Pine 4.53, allows remote malicious IMAP servers to cause a denial of service (crash) and possibly execute arbitrary code via certain large (1) literal and (2) mailbox size values that cause either integer signedness errors or integer overflow errors.
Max CVSS
7.5
EPSS Score
0.54%
Published
2003-06-16
Updated
2018-10-19
Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
Max CVSS
7.5
EPSS Score
32.18%
Published
2002-06-25
Updated
2017-10-10
Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header.
Max CVSS
7.5
EPSS Score
4.62%
Published
2000-12-19
Updated
2017-10-10
Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header.
Max CVSS
7.5
EPSS Score
0.95%
Published
2000-11-14
Updated
2017-10-10

CVE-2000-0284

Public exploit
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
Max CVSS
7.5
EPSS Score
92.34%
Published
2000-04-16
Updated
2008-09-10
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
Max CVSS
10.0
EPSS Score
4.53%
Published
1999-05-26
Updated
2008-09-09
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Max CVSS
10.0
EPSS Score
11.30%
Published
1997-04-07
Updated
2022-08-17
Arbitrary command execution via IMAP buffer overflow in authenticate command.
Max CVSS
10.0
EPSS Score
91.96%
Published
1998-07-20
Updated
2008-09-09
MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.
Max CVSS
5.0
EPSS Score
0.92%
Published
1997-12-16
Updated
2018-10-12
14 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!