Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

IMAP:CYRUS:FETCH-CMD

Severity

High

Recommended

No

Recommended Action

Drop

Category

IMAP

Keywords

Cyrus Fetch Command Buffer Overflow

Release Date

2004/12/01

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

IMAP: Cyrus Fetch Command Buffer Overflow


This signature detects attempts to exploit a known vulnerability against the Cyrus IMAP server. Attackers can use a malformed command to overflow a buffer and take control of the server.

Extended Description

Several remote buffer overflow and heap corruption vulnerabilities in versions of Cyrus IMAPD up to 2.2.8 have been identified. These vulnerabilities reportedly allow remote, attacker-supplied machine code to be executed in the context of the affected server process. Cyrus-IMAPD is usually running as a non-privileged user.

Affected Products

  • Apple Mac OS X 10.0.0
  • Apple Mac OS X 10.0.0 3
  • Apple Mac OS X 10.0.1
  • Apple Mac OS X 10.0.2
  • Apple Mac OS X 10.0.3
  • Apple Mac OS X 10.0.4
  • Apple Mac OS X 10.1.0
  • Apple Mac OS X 10.1.1
  • Apple Mac OS X 10.1.2
  • Apple Mac OS X 10.1.3
  • Apple Mac OS X 10.1.4
  • Apple Mac OS X 10.1.5
  • Apple Mac OS X 10.2.0
  • Apple Mac OS X 10.2.1
  • Apple Mac OS X 10.2.2
  • Apple Mac OS X 10.2.3
  • Apple Mac OS X 10.2.4
  • Apple Mac OS X 10.2.5
  • Apple Mac OS X 10.2.6
  • Apple Mac OS X 10.2.7
  • Apple Mac OS X 10.2.8
  • Apple Mac OS X 10.3.0
  • Apple Mac OS X 10.3.1
  • Apple Mac OS X 10.3.2
  • Apple Mac OS X 10.3.3
  • Apple Mac OS X 10.3.4
  • Apple Mac OS X 10.3.5
  • Apple Mac OS X 10.3.6
  • Apple Mac OS X 10.3.7
  • Apple Mac OS X 10.3.8
  • Apple Mac OS X Server 10.0.0
  • Apple Mac OS X Server 10.1.0
  • Apple Mac OS X Server 10.1.1
  • Apple Mac OS X Server 10.1.2
  • Apple Mac OS X Server 10.1.3
  • Apple Mac OS X Server 10.1.4
  • Apple Mac OS X Server 10.1.5
  • Apple Mac OS X Server 10.2.0
  • Apple Mac OS X Server 10.2.1
  • Apple Mac OS X Server 10.2.2
  • Apple Mac OS X Server 10.2.3
  • Apple Mac OS X Server 10.2.4
  • Apple Mac OS X Server 10.2.5
  • Apple Mac OS X Server 10.2.6
  • Apple Mac OS X Server 10.2.7
  • Apple Mac OS X Server 10.2.8
  • Apple Mac OS X Server 10.3.0
  • Apple Mac OS X Server 10.3.1
  • Apple Mac OS X Server 10.3.2
  • Apple Mac OS X Server 10.3.3
  • Apple Mac OS X Server 10.3.4
  • Apple Mac OS X Server 10.3.5
  • Apple Mac OS X Server 10.3.6
  • Apple Mac OS X Server 10.3.7
  • Apple Mac OS X Server 10.3.8
  • Carnegie Mellon University Cyrus IMAP Server 2.1.10
  • Carnegie Mellon University Cyrus IMAP Server 2.1.16
  • Carnegie Mellon University Cyrus IMAP Server 2.1.7
  • Carnegie Mellon University Cyrus IMAP Server 2.1.9
  • Carnegie Mellon University Cyrus IMAP Server 2.2.0 .0 ALPHA
  • Carnegie Mellon University Cyrus IMAP Server 2.2.1 BETA
  • Carnegie Mellon University Cyrus IMAP Server 2.2.2 Beta
  • Carnegie Mellon University Cyrus IMAP Server 2.2.3
  • Carnegie Mellon University Cyrus IMAP Server 2.2.4
  • Carnegie Mellon University Cyrus IMAP Server 2.2.5
  • Carnegie Mellon University Cyrus IMAP Server 2.2.6
  • Carnegie Mellon University Cyrus IMAP Server 2.2.7
  • Carnegie Mellon University Cyrus IMAP Server 2.2.8
  • Conectiva Linux 10.0.0
  • Conectiva Linux 9.0.0
  • OpenPKG Current
  • Red Hat Fedora Core2
  • Red Hat Fedora Core3
  • Trustix Secure Enterprise Linux 2.0.0
  • Trustix Secure Linux 2.0.0
  • Trustix Secure Linux 2.1.0
  • Trustix Secure Linux 2.2.0
  • Ubuntu Ubuntu Linux 4.1.0 Ia32
  • Ubuntu Ubuntu Linux 4.1.0 Ia64
  • Ubuntu Ubuntu Linux 4.1.0 Ppc

References

  • BugTraq: 11729
  • CVE: CVE-2004-1013

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out