Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2002-0379Improper Restriction of Operations within the Bounds of a Memory Buffer in OF Washington Uw-imap

7 documents6 sources
Severity
7.5HIGHNVD
EPSS
34.6%
top 2.98%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 25
Latest updateMay 3

Description

Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-cqq9-qgwr-48j4: Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 20012022-05-03

💥Exploits & PoCs

2
Exploit-DB
WU-IMAPd 2000/2001 - Partial Mailbox Attribute Remote Buffer Overflow (1)2002-05-10
Exploit-DB
WU-IMAPd 2000/2001 - Partial Mailbox Attribute Remote Buffer Overflow (2)2002-05-10

🔍Detection Rules

1
Suricata
GPL IMAP EXPLOIT partial body overflow attempt2010-09-23

📋Vendor Advisories

1
Red Hat
security flaw2002-05-10

💬Community

1
Bugzilla
CVE-2002-0379 security flaw2018-08-16