First published: Thu May 20 2004(Updated: )
Integer overflow in imapparse.c for Cyrus IMAP server 1.4 and 2.1.10 allows remote attackers to execute arbitrary code via a large length value that facilitates a buffer overflow attack, a different vulnerability than CVE-2002-1347.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus IMAP | =1.4 | |
Cyrus IMAP | =1.5.19 | |
Cyrus IMAP | =2.0.12 | |
Cyrus IMAP | =2.0.16 | |
Cyrus IMAP | =2.1.9 | |
Cyrus IMAP | =2.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1580 has been classified with a high severity due to its potential to allow arbitrary code execution.
To fix CVE-2002-1580, update the Cyrus IMAP server to a version that has patched this vulnerability.
CVE-2002-1580 affects Cyrus IMAP server versions 1.4, 1.5.19, 2.0.12, 2.0.16, 2.1.9, and 2.1.10.
Yes, CVE-2002-1580 can be exploited remotely by attackers sending specially crafted requests to the Cyrus IMAP server.
The impact of CVE-2002-1580 includes potential for remote code execution, which can compromise the security of affected systems.