CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
77.4%
Package : cyrus-imapd
Version : 2.5.10-3+deb9u3
CVE ID : CVE-2019-18928 CVE-2021-33582
Debian Bug : 993433
It was discovered that the Cyrus IMAP server was prone to a denial of service
attack via input that is mishandled during hash-table interaction. Furthermore
it allowed privilege escalation because an HTTP request may be interpreted in
the authentication context of an unrelated previous request that arrived over
the same connection.
For Debian 9 stretch, these problems have been fixed in version
2.5.10-3+deb9u3.
We recommend that you upgrade your cyrus-imapd packages.
For the detailed security status of cyrus-imapd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/cyrus-imapd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: This is a digitally signed message part
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | amd64 | libcyrus-imap-perl | < 3.0.8-6+deb10u6 | libcyrus-imap-perl_3.0.8-6+deb10u6_amd64.deb |
Debian | 11 | armhf | cyrus-caldav-dbgsym | < 3.2.6-2+deb11u1 | cyrus-caldav-dbgsym_3.2.6-2+deb11u1_armhf.deb |
Debian | 11 | ppc64el | cyrus-pop3d-dbgsym | < 3.2.6-2+deb11u1 | cyrus-pop3d-dbgsym_3.2.6-2+deb11u1_ppc64el.deb |
Debian | 11 | armel | cyrus-pop3d | < 3.2.6-2+deb11u1 | cyrus-pop3d_3.2.6-2+deb11u1_armel.deb |
Debian | 11 | armhf | cyrus-replication | < 3.2.6-2+deb11u1 | cyrus-replication_3.2.6-2+deb11u1_armhf.deb |
Debian | 10 | mips64el | cyrus-murder-dbgsym | < 3.0.8-6+deb10u6 | cyrus-murder-dbgsym_3.0.8-6+deb10u6_mips64el.deb |
Debian | 11 | i386 | cyrus-admin-dbgsym | < 3.2.6-2+deb11u1 | cyrus-admin-dbgsym_3.2.6-2+deb11u1_i386.deb |
Debian | 11 | s390x | cyrus-dev | < 3.2.6-2+deb11u1 | cyrus-dev_3.2.6-2+deb11u1_s390x.deb |
Debian | 11 | i386 | cyrus-imapd-dbgsym | < 3.2.6-2+deb11u1 | cyrus-imapd-dbgsym_3.2.6-2+deb11u1_i386.deb |
Debian | 11 | s390x | libcyrus-imap-perl-dbgsym | < 3.2.6-2+deb11u1 | libcyrus-imap-perl-dbgsym_3.2.6-2+deb11u1_s390x.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
77.4%