First published: Wed May 26 1999(Updated: )
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington c-client | =4.4 | |
University of Washington POP2D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0920 is considered to have a high severity due to the potential for remote privilege escalation.
To fix CVE-1999-0920, upgrade to a patched version of the IMAP package or the POP2D daemon provided by the University of Washington.
CVE-1999-0920 affects the University of Washington IMAP version 4.4 and the POP2D daemon.
Attackers exploiting CVE-1999-0920 can gain elevated privileges on the affected system via the FOLD command.
While CVE-1999-0920 is an older vulnerability, it poses a threat to any unpatched systems still running affected software.