First published: Mon Apr 07 1997(Updated: )
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington POP | =3 | |
University of Washington UW-IMAP | =4 | |
IBM AIX | =4.2.1 | |
Red Hat Linux | =2.0 | |
SCO OpenLinux Server | =1.0 | |
BSDI BSD/OS | =3.0 | |
BSDI BSD/OS | =2.1 | |
Red Hat Linux | =4.0 | |
=4 | ||
=3 | ||
=2.1 | ||
=3.0 | ||
=1.0 | ||
=4.2.1 | ||
=2.0 | ||
=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0042 is classified as a critical vulnerability due to its potential for remote code execution via a buffer overflow.
To fix CVE-1999-0042, upgrade to the latest version of the University of Washington's IMAP and POP servers that does not have this vulnerability.
CVE-1999-0042 affects the University of Washington POP and IMAP servers, as well as several versions of IBM AIX and Red Hat Linux.
Yes, CVE-1999-0042 can be exploited remotely, allowing attackers to execute arbitrary code on vulnerable systems.
CVE-1999-0042 was disclosed in 1999, highlighting long-standing vulnerabilities in the implementation of IMAP and POP protocols.