|Category:||Remote file access|
|Title:||IMAP arbitrary file retrieval|
|Summary:||The target is running an IMAP daemon that allows an authenticated user; to retrieve and manipulate files that would be available to that user via a shell. If IMAP users are denied; shell access, you may consider this a vulnerability.|
The target is running an IMAP daemon that allows an authenticated user
to retrieve and manipulate files that would be available to that user via a shell. If IMAP users are denied
shell access, you may consider this a vulnerability.
Contact your vendor for a fix.
BugTraq ID: 4909|
Common Vulnerability Exposure (CVE) ID: CVE-2002-1782
Bugtraq: 20020601 SECURITY.NNOV: Courier CPU exhaustion + bonus on imap-uw (Google Search)
XForce ISS Database: wuimapd-information-disclosure(9238)
|Copyright||Copyright (C) 2004 George A. Theall|
|This is only one of 87302 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.