CVE-2008-5005

Source
https://nvd.nist.gov/vuln/detail/CVE-2008-5005
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2008-5005.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2008-5005
Related
Published
2008-11-10T14:12:56Z
Modified
2025-02-13T17:00:18Z
Downstream
Summary
[none]
Details

Multiple stack-based buffer overflows in (1) University of Washington IMAP Toolkit 2002 through 2007c, (2) University of Washington Alpine 2.00 and earlier, and (3) Panda IMAP allow (a) local users to gain privileges by specifying a long folder extension argument on the command line to the tmail or dmail program; and (b) remote attackers to execute arbitrary code by sending e-mail to a destination mailbox name composed of a username and '+' character followed by a long string, processed by the tmail or possibly dmail program.

References

Affected packages

Debian:11 / uw-imap

Package

Name
uw-imap
Purl
pkg:deb/debian/uw-imap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7:2007d~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / uw-imap

Package

Name
uw-imap
Purl
pkg:deb/debian/uw-imap?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7:2007d~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}