IMAP-4.1BETA server can be crashed with a core file containing hashed passwords |
---|
Risk Level: | High | Check or Attack Name: imapd Core Vulnerability |
---|---|---|
Platforms: | Internet Message Access Protocol (IMAP) | |
Description: | IMAP-4.1BETA from the University of Washington's IMAP 4.1 toolkit contains a vulnerability that allows a remote attacker to cause the service to core dump. The core file contains the shadow password file, which can then be used to break into accounts on the system. The attacker is required to have an account on the system to exploit this hole. |
|
Remedy: | Upgrade to the latest stable IMAP server package available from your vendor. |
|
References: | L0pht Security Advisory, imapd (imap-4.1BETA from the IMAP 4.1 toolkit from University of Washington), http://www.l0pht.com/advisories/imapd.txt |
Know Your Risks |