DEBIAN-CVE-2019-18928

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-18928
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-18928.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-18928
Upstream
Published
2019-11-15T04:15:10Z
Modified
2025-09-18T05:18:14Z
Summary
[none]
Details

Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.

References

Affected packages

Debian:11 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.12-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.12-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.12-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / cyrus-imapd

Package

Name
cyrus-imapd
Purl
pkg:deb/debian/cyrus-imapd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.12-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}