PROTOCOL-IMAP -- Snort alerted on Internet Message Access Protocol (IMAP) traffic, an email retrieval system for clients over TCP/IP connection. This protocol handles emails on a remote server, so all actions are processed on that server rather than the user client. This protocol is vulnerable to injection, restriction and process evasions, leaks, relay abuse, and other attacks.
PROTOCOL-IMAP login buffer overflow attempt
Arbitrary command execution via IMAP buffer overflow in authenticate command. Impact: CVSS base score 10.0 CVSS impact score 10.0 CVSS exploitability score 10.0 confidentialityImpact COMPLETE integrityImpact COMPLETE availabilityImpact COMPLETE Details: Ease of Attack:
No information provided
No public information
No known false positives
Talos research team. This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology. For more information see [nvd].
No rule groups
CVE-1999-0005 |
Loading description
|
CVE-2006-5961 |
Loading description
|
CVE-2007-3925 |
Loading description
|
CVE-1999-1557 |
Loading description
|
CVE-2004-1011 |
Loading description
|
CVE-2005-1255 |
Loading description
|
CVE-2007-1373 |
Loading description
|
CVE-2007-2795 |
Loading description
|