Vulnerabilities > CVE-1999-0042
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE network
low complexity
university-of-washington
ibm
redhat
caldera
bsdi
critical
nessus
exploit available
Summary
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 | |
OS | 1 | |
OS | 2 | |
OS | 1 | |
OS | 2 |
Exploit-Db
description | Linux imapd Remote Overflow File Retrieve Exploit. CVE-1999-0042. Remote exploit for linux platform |
id | EDB-ID:340 |
last seen | 2016-01-31 |
modified | 1997-06-24 |
published | 1997-06-24 |
reporter | p1 |
source | https://www.exploit-db.com/download/340/ |
title | Linux imapd Remote Overflow File Retrieve Exploit |
Nessus
NASL family | Gain a shell remotely |
NASL id | IMAP_OVERFLOW.NASL |
description | A remote buffer overflow in this IMAP server may allow a remote user to gain root privileges. University of Washington IMAP server is known to be affected. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10125 |
published | 1999-06-22 |
reporter | This script is Copyright (C) 1999-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/10125 |
title | UoW IMAP/POP server_login() Function Remote Overflow |