Vulnerabilities > CVE-2005-3189 - Unspecified vulnerability in Qualcomm Worldmail Imap Server 3.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Directory traversal vulnerability in Qualcomm WorldMail IMAP Server allows remote attackers to read arbitrary email messages via ".." sequences in the SELECT command.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Qualcomm Worldmail Server 3.0 Directory Traversal Vulnerability. CVE-2005-3189. Remote exploit for linux platform |
id | EDB-ID:26536 |
last seen | 2016-02-03 |
modified | 2005-11-17 |
published | 2005-11-17 |
reporter | FistFuXXer |
source | https://www.exploit-db.com/download/26536/ |
title | qualcomm worldmail server 3.0 - Directory Traversal Vulnerability |
Nessus
NASL family | Windows |
NASL id | WORLDMAIL_DIR_TRAVERSAL.NASL |
description | The remote host is running Eudora WorldMail, a commercial mail server for Windows. The IMAP server bundled with the version of WorldMail installed on the remote host fails to filter directory traversal sequences from mailbox names and fails to restrict access to mailboxes within its spool area. An authenticated attacker can exploit these issues to read and manage the messages of other users on the affected application as well as to move arbitrary folders on the affected system. Such attacks could result in the disclosure of sensitive information as well as affect the stability of the remote host itself. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20224 |
published | 2005-11-18 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20224 |
title | WorldMail IMAP Server Traversal Arbitrary Mail Spool Access |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/41692/11.17.05.txt |
id | PACKETSTORM:41692 |
last seen | 2016-12-05 |
published | 2005-11-20 |
reporter | iDefense Labs |
source | https://packetstormsecurity.com/files/41692/iDEFENSE-Security-Advisory-2005-11-17.t.html |
title | iDEFENSE Security Advisory 2005-11-17.t |
References
- http://secunia.com/advisories/17640
- http://secunia.com/advisories/17640
- http://securityreason.com/securityalert/192
- http://securityreason.com/securityalert/192
- http://securitytracker.com/id?1015236
- http://securitytracker.com/id?1015236
- http://www.idefense.com/application/poi/display?id=341&type=vulnerabilities
- http://www.idefense.com/application/poi/display?id=341&type=vulnerabilities
- http://www.securityfocus.com/bid/15488
- http://www.securityfocus.com/bid/15488
- http://www.vupen.com/english/advisories/2005/2479
- http://www.vupen.com/english/advisories/2005/2479