First published: Tue Jun 25 2002(Updated: )
Buffer overflow in University of Washington imap server (uw-imapd) imap-2001 (imapd 2001.315) and imap-2001a (imapd 2001.315) with legacy RFC 1730 support, and imapd 2000.287 and earlier, allows remote authenticated users to execute arbitrary code via a long BODY request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington imapd | =2000.283 | |
University of Washington imapd | =2000.315 | |
University of Washington imapd | =2000.287 | |
University of Washington imapd | =2000.284 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0379 is classified as a high-severity vulnerability due to its potential to allow remote authenticated users to execute arbitrary code.
To fix CVE-2002-0379, you should upgrade to a version of the University of Washington imap server that is not affected by the vulnerability.
CVE-2002-0379 affects users of the University of Washington imap server versions 2000.283, 2000.287, 2000.284, and 2000.315.
Yes, CVE-2002-0379 can be exploited remotely by authenticated users.
CVE-2002-0379 can compromise system security by allowing arbitrary code execution, potentially leading to unauthorized access or control over the affected system.