CVE-2011-3208
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
14/09/2011
Last modified:
11/04/2025
Description
Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cmu:cyrus_imap_server:*:*:*:*:*:*:*:* | 2.3.16 (including) | |
| cpe:2.3:a:cmu:cyrus_imap_server:2.0.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.1.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.1.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.1.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.13p1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd
- http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
- http://secunia.com/advisories/45938
- http://secunia.com/advisories/45975
- http://secunia.com/advisories/46064
- http://securitytracker.com/id?1026031=
- http://www.debian.org/security/2011/dsa-2318
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A149
- http://www.osvdb.org/75307
- http://www.redhat.com/support/errata/RHSA-2011-1317.html
- http://www.securityfocus.com/bid/49534
- https://bugzilla.redhat.com/show_bug.cgi?id=734926
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
- https://hermes.opensuse.org/messages/11723935
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd
- http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
- http://secunia.com/advisories/45938
- http://secunia.com/advisories/45975
- http://secunia.com/advisories/46064
- http://securitytracker.com/id?1026031=
- http://www.debian.org/security/2011/dsa-2318
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A149
- http://www.osvdb.org/75307
- http://www.redhat.com/support/errata/RHSA-2011-1317.html
- http://www.securityfocus.com/bid/49534
- https://bugzilla.redhat.com/show_bug.cgi?id=734926
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
- https://hermes.opensuse.org/messages/11723935



