uw-imap: Remote buffer overflow uw-imap is vulnerable to remote overflow of a buffer in the IMAP server leading to execution of arbitrary code. uw-imap 2005-10-11 2005-10-11 108206 remote 2004g 2004g

uw-imap is the University of Washington's IMAP and POP server daemons.

Improper bounds checking of user supplied data while parsing IMAP mailbox names can lead to overflowing the stack buffer.

Successful exploitation requires an authenticated IMAP user to request a malformed mailbox name. This can lead to execution of arbitrary code with the permissions of the IMAP server.

There are no known workarounds at this time.

All uw-imap users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004g"
CAN-2005-2933 iDEFENSE Security Advisory koon koon r2d2