First published: Tue Dec 31 2002(Updated: )
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington imapd | =2001.0a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1782 has been classified as a moderate severity vulnerability due to its potential for unauthorized file access.
To mitigate CVE-2002-1782, configure the University of Washington IMAP daemon to restrict access to sensitive files.
CVE-2002-1782 primarily affects local users with valid IMAP accounts on systems running the vulnerable version of the University of Washington IMAP daemon.
CVE-2002-1782 impacts systems running the default configuration of University of Washington IMAP daemon version 2001.0a.
No, CVE-2002-1782 can only be exploited locally by users with valid IMAP accounts on the affected system.