Show filters
10 Total Results
Displaying 1-10 of 10
Sort by:
Attacker Value
Unknown

CVE-2009-0688

Disclosure Date: May 15, 2009 (last updated October 04, 2023)
Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
0
Attacker Value
Unknown

CVE-2006-0250

Disclosure Date: January 18, 2006 (last updated February 22, 2025)
Format string vulnerability in the snmp_input function in snmptrapd in CMU SNMP utilities (cmu-snmp) allows remote attackers to execute arbitrary code by sending crafted SNMP messages to UDP port 162.
0
Attacker Value
Unknown

CVE-2004-1012

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the PARTIAL command in Cyrus IMAP Server 2.2.6 and earlier allows remote authenticated users to execute arbitrary code via a certain command ("body[p") that is treated as a different command ("body.peek") and causes an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown

CVE-2004-1013

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
0
Attacker Value
Unknown

CVE-2004-1015

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Buffer overflow in proxyd for Cyrus IMAP Server 2.2.9 and earlier, with the imapmagicplus option enabled, may allow remote attackers to execute arbitrary code, a different vulnerability than CVE-2004-1011.
0
Attacker Value
Unknown

CVE-2004-1011

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in Cyrus IMAP Server 2.2.4 through 2.2.8, with the imapmagicplus option enabled, allows remote attackers to execute arbitrary code via a long (1) PROXY or (2) LOGIN command, a different vulnerability than CVE-2004-1015.
0
Attacker Value
Unknown

CVE-2004-1067

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Off-by-one error in the mysasl_canon_user function in Cyrus IMAP Server 2.2.9 and earlier leads to a buffer overflow, which may allow remote attackers to execute arbitrary code via the username.
0
Attacker Value
Unknown

CVE-2002-1580

Disclosure Date: June 14, 2004 (last updated February 22, 2025)
Integer overflow in imapparse.c for Cyrus IMAP server 1.4 and 2.1.10 allows remote attackers to execute arbitrary code via a large length value that facilitates a buffer overflow attack, a different vulnerability than CVE-2002-1347.
0
Attacker Value
Unknown

CVE-2001-1154

Disclosure Date: August 30, 2001 (last updated February 22, 2025)
Cyrus 2.0.15, 2.0.16, and 1.6.24 on BSDi 4.2, with IMAP enabled, allows remote attackers to cause a denial of service (hang) using PHP IMAP clients.
0
Attacker Value
Unknown

CVE-2000-0956

Disclosure Date: December 19, 2000 (last updated February 22, 2025)
cyrus-sasl before 1.5.24 in Red Hat Linux 7.0 does not properly verify the authorization for a local user, which could allow the users to bypass specified access restrictions.
0