First published: Mon May 22 2006(Updated: )
Stack-based buffer overflow in pop3d in Cyrus IMAPD (cyrus-imapd) 2.3.2, when the popsubfolders option is enabled, allows remote attackers to execute arbitrary code via a long USER command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cyrus SASL | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2502 has a high severity rating due to the potential for remote code execution.
To mitigate CVE-2006-2502, upgrade Cyrus IMAPD to version 2.3.3 or later.
CVE-2006-2502 specifically affects Cyrus IMAPD version 2.3.2 with the popsubfolders option enabled.
Yes, CVE-2006-2502 can be exploited remotely through a crafted long USER command.
CVE-2006-2502 is a stack-based buffer overflow vulnerability.