First published: Thu Aug 19 2004(Updated: )
Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Courier-IMAP | =2.2.1 | |
Courier-IMAP | =2.1.2 | |
Courier-IMAP | =2.1.1 | |
Courier-IMAP | =1.7 | |
Courier-IMAP | =2.2.0 | |
Courier-IMAP | =1.6 | |
Courier-IMAP | =2.0.0 | |
Courier-IMAP | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0777 is considered a high-severity vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2004-0777, it is recommended to disable debugging features and upgrade to a patched version of Courier-IMAP.
CVE-2004-0777 affects Courier-IMAP versions from 1.6.0 to 2.2.1 and all 3.x versions up to 3.0.3.
Yes, CVE-2004-0777 can lead to data breaches since it allows attackers to execute arbitrary code on the affected system.
Yes, CVE-2004-0777 is a publicly known vulnerability and detailed information can be found in various security advisories.