Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p9j6-5f4r-fcwc

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

EPSS

Процентиль: 93%
0.10245
Средний

Связанные уязвимости

ubuntu
больше 20 лет назад

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

nvd
больше 20 лет назад

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

debian
больше 20 лет назад

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x th ...

EPSS

Процентиль: 93%
0.10245
Средний