First published: Tue Apr 24 2007(Updated: )
Eval injection vulnerability in (1) courier-imapd.indirect and (2) courier-pop3d.indirect in Courier-IMAP before 4.0.6-r2, and 4.1.x before 4.1.2-r1, on Gentoo Linux allows remote attackers to execute arbitrary commands via the XMAILDIR variable, related to the LOGINRUN variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | ||
Courier IMAP | =4.0.0 | |
Courier IMAP | =4.0.1 | |
Courier IMAP | =4.0.2 | |
Courier IMAP | =4.0.3 | |
Courier IMAP | =4.0.4 | |
Courier IMAP | =4.0.5 | |
Courier IMAP | =4.1.0 | |
Courier IMAP | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2173 is considered a high severity vulnerability as it allows remote attackers to execute arbitrary commands.
To fix CVE-2007-2173, upgrade Courier-IMAP to version 4.0.6-r2 or 4.1.2-r1 or later.
CVE-2007-2173 affects Courier-IMAP versions 4.0.0 to 4.0.5 and 4.1.0 to 4.1.1.
CVE-2007-2173 is an evaluation injection vulnerability.
Users running vulnerable versions of Courier-IMAP on Gentoo Linux are affected by CVE-2007-2173.