Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p9j6-5f4r-fcwc

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

EPSS

Процентиль: 93%
0.10245
Средний

Связанные уязвимости

ubuntu
около 21 года назад

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

nvd
около 21 года назад

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.

debian
около 21 года назад

The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x th ...

EPSS

Процентиль: 93%
0.10245
Средний