DescriptionThe argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SA:2004:043, published Friday, Dec 3rd 2004 13:00 MEST
- SUSE-SR:2004:003, published Tuesday, Dec 7th 2004 15:00 MEST
SUSE Timeline for this CVECVE page created: Fri Jun 28 01:02:15 2013
CVE page last modified: Fri Oct 7 12:45:29 2022