First published: Fri Dec 19 2008(Updated: )
Ludwig Nussel reported a flaw in libc-client / uw-imap: The rfc822_output_char() function in the uw-imap c-client library does not check whether the buffer is already full and may therefore write one byte too much. This leads to a segfault in rfc822_output_data() later due to memcpy with size -1. Issue was fixed in imap-2007e: Updated: 16 December 2008 imap-2007e is a maintenance release, consisting primarily of bugfixes to problems discovered in the release that affected a small number of users plus a security fix for users of the RFC822BUFFER routines.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
University of Washington c-client | <=2007d | |
University of Washington c-client | =2000 | |
University of Washington c-client | =2000a | |
University of Washington c-client | =2000b | |
University of Washington c-client | =2000c | |
University of Washington c-client | =2001 | |
University of Washington c-client | =2001a | |
University of Washington c-client | =2002 | |
University of Washington c-client | =2002a | |
University of Washington c-client | =2002b | |
University of Washington c-client | =2002c | |
University of Washington c-client | =2002d | |
University of Washington c-client | =2002e | |
University of Washington c-client | =2002f | |
University of Washington c-client | =2004 | |
University of Washington c-client | =2004a | |
University of Washington c-client | =2004b | |
University of Washington c-client | =2004c | |
University of Washington c-client | =2004d | |
University of Washington c-client | =2004e | |
University of Washington c-client | =2004f | |
University of Washington c-client | =2004g | |
University of Washington c-client | =2006 | |
University of Washington c-client | =2006a | |
University of Washington c-client | =2006b | |
University of Washington c-client | =2006c | |
University of Washington c-client | =2006d | |
University of Washington c-client | =2006e | |
University of Washington c-client | =2006f | |
University of Washington c-client | =2006g | |
University of Washington c-client | =2006h | |
University of Washington c-client | =2006i | |
University of Washington c-client | =2006j | |
University of Washington c-client | =2006k | |
University of Washington c-client | =2007 | |
University of Washington c-client | =2007a | |
University of Washington c-client | =2007b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-5514 is classified as high due to potential segmentation faults leading to application crashes.
To fix CVE-2008-5514, upgrade the University of Washington c-client library to a version later than 2007d.
CVE-2008-5514 affects various versions of the University of Washington c-client, specifically all versions prior to 2007d.
CVE-2008-5514 is a memory corruption vulnerability that can result in buffer overflow issues.
CVE-2008-5514 was reported by Ludwig Nussel.