CWE
119
Advisory Published
CVE Published
Updated

CVE-2008-5514: Buffer Overflow

First published: Fri Dec 19 2008(Updated: )

Ludwig Nussel reported a flaw in libc-client / uw-imap: The rfc822_output_char() function in the uw-imap c-client library does not check whether the buffer is already full and may therefore write one byte too much. This leads to a segfault in rfc822_output_data() later due to memcpy with size -1. Issue was fixed in imap-2007e: Updated: 16 December 2008 imap-2007e is a maintenance release, consisting primarily of bugfixes to problems discovered in the release that affected a small number of users plus a security fix for users of the RFC822BUFFER routines.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
University of Washington c-client<=2007d
University of Washington c-client=2000
University of Washington c-client=2000a
University of Washington c-client=2000b
University of Washington c-client=2000c
University of Washington c-client=2001
University of Washington c-client=2001a
University of Washington c-client=2002
University of Washington c-client=2002a
University of Washington c-client=2002b
University of Washington c-client=2002c
University of Washington c-client=2002d
University of Washington c-client=2002e
University of Washington c-client=2002f
University of Washington c-client=2004
University of Washington c-client=2004a
University of Washington c-client=2004b
University of Washington c-client=2004c
University of Washington c-client=2004d
University of Washington c-client=2004e
University of Washington c-client=2004f
University of Washington c-client=2004g
University of Washington c-client=2006
University of Washington c-client=2006a
University of Washington c-client=2006b
University of Washington c-client=2006c
University of Washington c-client=2006d
University of Washington c-client=2006e
University of Washington c-client=2006f
University of Washington c-client=2006g
University of Washington c-client=2006h
University of Washington c-client=2006i
University of Washington c-client=2006j
University of Washington c-client=2006k
University of Washington c-client=2007
University of Washington c-client=2007a
University of Washington c-client=2007b

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2008-5514?

    The severity of CVE-2008-5514 is classified as high due to potential segmentation faults leading to application crashes.

  • How do I fix CVE-2008-5514?

    To fix CVE-2008-5514, upgrade the University of Washington c-client library to a version later than 2007d.

  • What software is affected by CVE-2008-5514?

    CVE-2008-5514 affects various versions of the University of Washington c-client, specifically all versions prior to 2007d.

  • What type of vulnerability is CVE-2008-5514?

    CVE-2008-5514 is a memory corruption vulnerability that can result in buffer overflow issues.

  • Who reported CVE-2008-5514?

    CVE-2008-5514 was reported by Ludwig Nussel.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203