Vulnerabilidad en nntpd.c en nntpd en el servidor Cyrus IMAP (CVE-2011-3208)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
14/09/2011
Última modificación:
11/04/2025
Descripción
Desbordamiento de búfer basado en la pila en la función split_wildmats en nntpd.c en nntpd en el servidor Cyrus IMAP antes de la verison v2.3.17 y en v2.4.x antes de v2.4.11 permite a atacantes remotos ejecutar código de su elección mediante un comando NNTP debidamente modificado.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:cmu:cyrus_imap_server:*:*:*:*:*:*:*:* | 2.3.16 (incluyendo) | |
| cpe:2.3:a:cmu:cyrus_imap_server:2.0.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.1.16:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.1.17:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.1.18:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.13p1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.2.14:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cmu:cyrus_imap_server:2.3.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd
- http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
- http://secunia.com/advisories/45938
- http://secunia.com/advisories/45975
- http://secunia.com/advisories/46064
- http://securitytracker.com/id?1026031=
- http://www.debian.org/security/2011/dsa-2318
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A149
- http://www.osvdb.org/75307
- http://www.redhat.com/support/errata/RHSA-2011-1317.html
- http://www.securityfocus.com/bid/49534
- https://bugzilla.redhat.com/show_bug.cgi?id=734926
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
- https://hermes.opensuse.org/messages/11723935
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=199
- http://asg.andrew.cmu.edu/archive/message.php?mailbox=archive.cyrus-announce&msg=200
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=0f8f026699829b65733c3081657b24e2174f4f4d
- http://git.cyrusimap.org/cyrus-imapd/commit/?id=3244c18c928fa331f6927e2b8146abe90feafddd
- http://lists.opensuse.org/opensuse-updates/2011-09/msg00019.html
- http://secunia.com/advisories/45938
- http://secunia.com/advisories/45975
- http://secunia.com/advisories/46064
- http://securitytracker.com/id?1026031=
- http://www.debian.org/security/2011/dsa-2318
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A149
- http://www.osvdb.org/75307
- http://www.redhat.com/support/errata/RHSA-2011-1317.html
- http://www.securityfocus.com/bid/49534
- https://bugzilla.redhat.com/show_bug.cgi?id=734926
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69679
- https://hermes.opensuse.org/messages/11723935



