DescriptionUniversity of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1608-1, DSA-4353-1
Debian Bugs913775, 913835, 913836, 914632

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php5 (PTS)jessie5.6.33+dfsg-0+deb8u1vulnerable
jessie (security)5.6.39+dfsg-0+deb8u1fixed
php7.0 (PTS)stretch7.0.30-0+deb9u1vulnerable
stretch (security)7.0.33-0+deb9u1fixed
php7.3 (PTS)buster, sid7.3.0-2fixed
uw-imap (PTS)jessie8:2007f~dfsg-4vulnerable
buster, sid, stretch8:2007f~dfsg-5vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


Fixed in 5.6.39, 7.0.33, 7.1.25, 7.2.13, 7.3.0
PHP Bug:
PHP Bug:
PHP Bug:;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb

Search for package or bug name: Reporting problems