CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2008-5514

Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.
Publish Date : 2008-12-23 Last Update Date : 2017-08-07
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
4.3
Confidentiality Impact None (There is no impact to the confidentiality of the system.)
Integrity Impact None (There is no impact to the integrity of the system)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity Medium (The access conditions are somewhat specialized. Some preconditions must be satistified to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Denial Of ServiceOverflow
CWE ID 119

- Vendor Statements

Not vulnerable. This issue did not affect the versions of imap as shipped with Red Hat Enterprise Linux 2.1 and 3, and the versions of libc-client as shipped with Red Hat Enterprise Linux 4 and 5.
Source: Redhat

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2008-5514 oval:org.opensuse.security:def:20085514 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2008-5514

# Product Type Vendor Product Version Update Edition Language
1 Application University Of Washington Imap 2000 Version Details Vulnerabilities
2 Application University Of Washington Imap 2000a Version Details Vulnerabilities
3 Application University Of Washington Imap 2000b Version Details Vulnerabilities
4 Application University Of Washington Imap 2000c Version Details Vulnerabilities
5 Application University Of Washington Imap 2001 Version Details Vulnerabilities
6 Application University Of Washington Imap 2001a Version Details Vulnerabilities
7 Application University Of Washington Imap 2002 Version Details Vulnerabilities
8 Application University Of Washington Imap 2002a Version Details Vulnerabilities
9 Application University Of Washington Imap 2002b Version Details Vulnerabilities
10 Application University Of Washington Imap 2002c Version Details Vulnerabilities
11 Application University Of Washington Imap 2002d Version Details Vulnerabilities
12 Application University Of Washington Imap 2002e Version Details Vulnerabilities
13 Application University Of Washington Imap 2002f Version Details Vulnerabilities
14 Application University Of Washington Imap 2004 Version Details Vulnerabilities
15 Application University Of Washington Imap 2004a Version Details Vulnerabilities
16 Application University Of Washington Imap 2004b Version Details Vulnerabilities
17 Application University Of Washington Imap 2004c Version Details Vulnerabilities
18 Application University Of Washington Imap 2004d Version Details Vulnerabilities
19 Application University Of Washington Imap 2004e Version Details Vulnerabilities
20 Application University Of Washington Imap 2004f Version Details Vulnerabilities
21 Application University Of Washington Imap 2004g Version Details Vulnerabilities
22 Application University Of Washington Imap 2006 Version Details Vulnerabilities
23 Application University Of Washington Imap 2006a Version Details Vulnerabilities
24 Application University Of Washington Imap 2006b Version Details Vulnerabilities
25 Application University Of Washington Imap 2006c Version Details Vulnerabilities
26 Application University Of Washington Imap 2006d Version Details Vulnerabilities
27 Application University Of Washington Imap 2006e Version Details Vulnerabilities
28 Application University Of Washington Imap 2006f Version Details Vulnerabilities
29 Application University Of Washington Imap 2006g Version Details Vulnerabilities
30 Application University Of Washington Imap 2006h Version Details Vulnerabilities
31 Application University Of Washington Imap 2006i Version Details Vulnerabilities
32 Application University Of Washington Imap 2006j Version Details Vulnerabilities
33 Application University Of Washington Imap 2006k Version Details Vulnerabilities
34 Application University Of Washington Imap 2007 Version Details Vulnerabilities
35 Application University Of Washington Imap 2007a Version Details Vulnerabilities
36 Application University Of Washington Imap 2007b Version Details Vulnerabilities
37 Application University Of Washington Imap 2007d Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
University Of Washington Imap 37

- References For CVE-2008-5514

https://exchange.xforce.ibmcloud.com/vulnerabilities/47526
XF uwimapd-rfc822outputchar-dos(47526)
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00846.html
FEDORA FEDORA-2009-0371
http://www.vupen.com/english/advisories/2008/3490
VUPEN ADV-2008-3490
http://www.washington.edu/imap/documentation/RELNOTES.html CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=477227 CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
MANDRIVA MDVSA-2009:146
http://www.securityfocus.com/bid/32958
BID 32958 University of Washington IMAP c-client Buffer Overflow Vulnerability Release Date:2010-01-06
http://securitytracker.com/id?1021485
SECTRACK 1021485

- Metasploit Modules Related To CVE-2008-5514

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.