First published: Fri Nov 15 2019(Updated: )
Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cyrus-imapd | 3.2.6-2+deb11u2 3.2.6-2+deb11u4 3.6.1-4+deb12u3 3.6.1-4+deb12u2 3.10.1-1 | |
Cyrus IMAP Server | >=2.5.0<2.5.14 | |
Cyrus IMAP Server | >=3.0.0<3.0.12 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18928 is classified as a privilege escalation vulnerability.
To fix CVE-2019-18928, upgrade to Cyrus IMAP version 2.5.14 or 3.0.12 or later.
CVE-2019-18928 affects Cyrus IMAP versions prior to 2.5.14 and 3.x prior to 3.0.12.
CVE-2019-18928 affects systems running vulnerable versions of Cyrus IMAP on Debian and Fedora.
Yes, CVE-2019-18928 can potentially be exploited remotely due to its nature of handling HTTP requests.