First published: Fri Feb 25 2005(Updated: )
Multiple buffer overflows in Cyrus IMAPd before 2.2.11 may allow attackers to execute arbitrary code via (1) an off-by-one error in the imapd annotate extension, (2) an off-by-one error in "cached header handling," (3) a stack-based buffer overflow in fetchnews, or (4) a stack-based buffer overflow in imapd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =2.0.17 | |
Cyrus SASL | =2.1.16 | |
Cyrus SASL | =2.1.17 | |
Cyrus SASL | =2.1.18 | |
Cyrus SASL | =2.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0546 is classified as a critical vulnerability due to potential remote code execution.
To remediate CVE-2005-0546, upgrade to Cyrus IMAPd version 2.2.11 or later.
CVE-2005-0546 includes multiple buffer overflow vulnerabilities, including stack-based buffer overflows and off-by-one errors.
CVE-2005-0546 affects Cyrus IMAPd versions 2.0.17, 2.1.16, 2.1.17, 2.1.18, and 2.2.10.
Yes, CVE-2005-0546 can be exploited remotely, allowing attackers to execute arbitrary code without physical access.