CVE-2008-5005Improper Restriction of Operations within the Bounds of a Memory Buffer in Alpine

Severity
10.0CRITICALNVD
EPSS
4.8%
top 10.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateJun 14

Description

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the t

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages5 packages

debiandebian/uw-imap< uw-imap 7:2007d~dfsg-1 (bookworm)
debiandebian/alpine< uw-imap 7:2007d~dfsg-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-9hgh-p6fq-92mm: Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 22022-05-14
OSV
CVE-2008-5005: Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 22008-11-10

📋Vendor Advisories

3
Microsoft
Chromium: CVE-2022-2008 Out of bounds memory access in WebGL2022-06-14
Red Hat
uw-imap: buffer overflow in dmail and tmail2008-10-31
Debian
CVE-2008-5005: alpine - Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolk...2008

📐Framework References

1
CWE
Use of Potentially Dangerous Function

💬Community

1
Bugzilla
CVE-2008-5005 uw-imap: buffer overflow in dmail and tmail2008-11-03