CVE-2008-5005

NameCVE-2008-5005
DescriptionMultiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-1685-1, DTSA-174-1, DTSA-174-2
NVD severityhigh (attack range: remote)
Debian/oldoldstablenot vulnerable.
Debian/oldstablenot vulnerable.
Debian/stablenot vulnerable.
Debian/testingnot vulnerable.
Debian/unstablenot vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
alpine (PTS)squeeze2.00+dfsg-6+squeeze1fixed
wheezy2.02+dfsg-2fixed
stretch, jessie, sid2.11+dfsg1-3fixed
uw-imap (PTS)squeeze8:2007e~dfsg-3.1fixed
wheezy8:2007f~dfsg-2fixed
stretch, jessie, sid8:2007f~dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
alpinesource(unstable)(not affected)
uw-imapsource(unstable)7:2007d~dfsg-1high
uw-imapsourceetch7:2002edebian1-13.1+etch1highDSA-1685-1
uw-imapsourcelenny2007b~dfsg-4+lenny3highDTSA-174-2

Notes

- alpine <not-affected> (vulnerable code present but tmail/dmail wont be installed)

Search for package or bug name: Reporting problems