Vulnerability Details CVE-2004-1013
The argument parser of the FETCH command in Cyrus IMAP Server 2.2.x through 2.2.8 allows remote authenticated users to execute arbitrary code via certain commands such as (1) "body[p", (2) "binary[p", or (3) "binary[p") that cause an index increment error that leads to an out-of-bounds memory corruption.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.102
EPSS Ranking 92.7%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2004-1013
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.10
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.16
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.7
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.1.9
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.0_alpha
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.1_beta
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.2_beta
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.3
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.4
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.5
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.6
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.7
-
cpe:2.3:a:carnegie_mellon_university:cyrus_imap_server:2.2.8
-
cpe:2.3:a:openpkg:openpkg:current
-
cpe:2.3:o:conectiva:linux:10.0
-
cpe:2.3:o:conectiva:linux:9.0
-
cpe:2.3:o:redhat:fedora_core:core_2.0
-
cpe:2.3:o:redhat:fedora_core:core_3.0
-
cpe:2.3:o:trustix:secure_linux:2.0
-
cpe:2.3:o:trustix:secure_linux:2.1
-
cpe:2.3:o:trustix:secure_linux:2.2
-
cpe:2.3:o:ubuntu:ubuntu_linux:4.1