Bug 184073 - CVE-2005-2933 imap buffer overflow
Summary: CVE-2005-2933 imap buffer overflow
Keywords:
Status: CLOSED DUPLICATE of bug 170411
Alias: None
Product: Fedora Legacy
Classification: Retired
Component: imap
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Fedora Legacy Bugs
QA Contact:
URL: https://rhn.redhat.com/errata/RHSA-20...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-03-05 22:08 UTC by Pavel Kankovsky
Modified: 2007-04-18 17:39 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2006-03-05 22:38:05 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Bugzilla 169953 0 medium CLOSED CVE-2005-2933 imap buffer overflow 2021-02-22 00:41:40 UTC

Description Pavel Kankovsky 2006-03-05 22:08:07 UTC
Remote exploitation of a buffer overflow vulnerability in the University
of Washington's IMAP Server (UW-IMAP) allows attackers to execute
arbitrary code. (quote from iDefense advisory, see
http://www.idefense.com/intelligence/vulnerabilities/display.php?type=vulnerabilities&id=313)

All versions of imap < imap-2004g are affected. This includes RHL 7.3, RHL 9,
and probably most FC versions.

RH used the following patch to fix the issue in RHEL 2.1:
--snip--
Fix for CAN-2005-2933, from iDefense's advisory.

diff -uNr imap-2001a/src/c-client/mail.c imap-2004g/src/c-client/mail.c
--- imap-2001a/src/c-client/mail.c	2001-11-13 14:29:07.000000000 -0500
+++ imap-2004g/src/c-client/mail.c	2005-09-15 12:57:07.000000000 -0400
@@ -587,8 +587,10 @@
       if (c == '=') {		/* parse switches which take arguments */
 	if (*t == '"') {	/* quoted string? */
 	  for (v = arg,i = 0,++t; (c = *t++) != '"';) {
+	    if (!c) return NIL;	/* unterminated string */
 				/* quote next character */
 	    if (c == '\\') c = *t++;
+	    if (!c) return NIL;	/* can't quote NUL either */
 	    arg[i++] = c;
 	  }
 	  c = *t++;		/* remember delimiter for later */
--snip--
more or less the same patch is applicable to other versions as well.

Comment 1 Pavel Kankovsky 2006-03-05 22:38:05 UTC
Grrr...

*** This bug has been marked as a duplicate of 170411 ***


Note You need to log in before you can comment on or make changes to this bug.