CVE-2005-2933

NameCVE-2005-2933
DescriptionBuffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2004g allows remote attackers to execute arbitrary code via a mailbox name containing a single double-quote (") character without a closing quote, which causes bytes after the double-quote to be copied into a buffer indefinitely.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-861-1
NVD severityhigh (attack range: remote)
Debian Bugs332215, 348407

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
alpine (PTS)wheezy2.02+dfsg-2fixed
jessie2.11+dfsg1-3fixed
buster, sid, stretch2.20+dfsg1-7fixed
uw-imap (PTS)wheezy8:2007f~dfsg-2fixed
jessie8:2007f~dfsg-4fixed
buster, sid, stretch8:2007f~dfsg-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
alpinesource(unstable)(not affected)
pinesource(unstable)4.64-1medium348407
uw-imapsource(unstable)7:2002edebian1-12medium332215
uw-imapsourcesarge7:2002edebian1-11sarge1highDSA-861-1

Notes

- alpine <not-affected> (alpine is based on pine 4.64, this bug was in a previous version of pine)
[sarge] - pine <no-dsa> (pine is non-free; doesn't permit distribution of modified binaries)

Search for package or bug name: Reporting problems