Lucene search

K
ubuntuUbuntuUSN-4566-1
HistoryOct 05, 2020 - 12:00 a.m.

Cyrus IMAP Server vulnerabilities

2020-10-0500:00:00
ubuntu.com
51
cyrus imap server
ubuntu 18.04 esm
arbitrary code execution
unauthorized mailbox creation
cve-2019-11356
cve-2019-19783

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.029

Percentile

90.8%

Releases

  • Ubuntu 18.04 ESM

Packages

  • cyrus-imapd - An IMAP server

Details

It was dicovered that Cyrus IMAP Server could execute arbitrary code via a
crafted HTTP PUT operation for an event with a long iCalendar property name.
An attacker could use this vulnerability to cause a crash or possibly execute
arbitrary code. (CVE-2019-11356)

It was discovered that the Cyrus IMAP Server allow users to create any
mailbox with administrative privileges. A local attacker could use this to
obtain sensitive information. (CVE-2019-19783)

Rows per page:
1-10 of 211

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.7

Confidence

High

EPSS

0.029

Percentile

90.8%