CVE-2005-2933

NameCVE-2005-2933
DescriptionBuffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-861-1
Debian Bugs332215, 348407

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
alpine (PTS)buster2.21+dfsg1-1.1fixed
bullseye2.24+dfsg1-1fixed
sid, trixie, bookworm2.26+dfsg-1fixed
uw-imap (PTS)buster8:2007f~dfsg-6fixed
sid, trixie, bookworm, bullseye8:2007f~dfsg-7fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
alpinesource(unstable)(not affected)
pinesource(unstable)4.64-1medium348407
uw-imapsourcesarge7:2002edebian1-11sarge1DSA-861-1
uw-imapsource(unstable)7:2002edebian1-12medium332215

Notes

- alpine <not-affected> (alpine is based on pine 4.64, this bug was in a previous version of pine)
[sarge] - pine <no-dsa> (pine is non-free; doesn't permit distribution of modified binaries)

Search for package or bug name: Reporting problems