Short Name |
IMAP:OVERFLOW:WUIMAPD-MBOX-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
IMAP |
Keywords |
Wu-IMAPd Mailbox Buffer Overflow |
Release Date |
2005/10/31 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Washington University wu-imapd 2004g. Attackers can send a maliciously crafted mailbox name in a request to execute arbitrary code on the host; however a valid IMAP username and login are still required.
University of Washington IMAP is prone to a buffer-overflow vulnerability. This issue is exposed when the application parses mailbox names. If successful, an attacker may execute arbitrary code in the context of the server process. Note that to exploit this issue, the attacker must first authenticate to the service.