CVE-2009-0671 Detail
Rejected
This vulnerability has been rejected by the source.
Current Description
** REJECT ** Format string vulnerability in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit imap-2007d and other applications, allows remote attackers to execute arbitrary code via format string specifiers in the initial request to the IMAP port (143/tcp). NOTE: Red Hat has disputed the vulnerability, stating "The Red Hat Security Response Team have been unable to confirm the existence of this format string vulnerability in the toolkit, and the sample published exploit is not complete or functional." CVE agrees that the exploit contains syntax errors and uses Unix-only include files while invoking Windows functions.
Source:
MITRE
Description Last Modified:
02/22/2009
View Analysis Description
Analysis Description
Format string vulnerability in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit imap-2007d and other applications, allows remote attackers to execute arbitrary code via format string specifiers in the initial request to the IMAP port (143/tcp).
Source:
MITRE
Description Last Modified:
02/22/2009
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because
they may have information that would be of interest to you. No inferences should be drawn on account of other sites
being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose.
NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further,
NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about
this page to nvd@nist.gov.
Change History
2 change records found
- show changes
CVE Translated -
5/6/2015 4:45:00 AM
| Action |
Type |
Old Value |
New Value |
| Added |
Translation |
|
Record truncated, showing 500 of 900 characters.
View Entire Change Record
** RECHAZADA** Vulnerabilidad de cadena de formato en la librería de c-client University of Washington (UW), utilizado por el juego de herramientas UW IMAP imap-2007d y otras aplicaciones, permite a atacantes remotos ejecutar código arbitrario a través de especificadores de cadenas de formatos en la solicitud inicial del puerto IMAP (143/tcp). NOTA: Red Hat ha disputado la vulnerabilidad, diciendo que "el equipo de respuesta de seguridad de Red Hat no ha |
| Removed |
Translation |
Una vulnerabilidad de formato de cadena en la libreria c-client de la Universidad de Washington (UW), cuando se usa por parte de UW IMAP toolkit imap-2007d y las otras aplicaciones, lo que permite a atacantes remotos ejecutar código a su elección a través de especificadores de formato de cadena en la petición inicial al puerto IMAP (143/tcp). |
|
Initial CVE Analysis -
2/23/2009 4:17:00 PM
Quick Info
CVE Dictionary Entry:
CVE-2009-0671
NVD Published Date:
02/22/2009
NVD Last Modified:
02/26/2009
|