Vulnerability Details : CVE-2004-0777
Format string vulnerability in the auth_debug function in Courier-IMAP 1.6.0 through 2.2.1 and 3.x through 3.0.3, when login debugging (DEBUG_LOGIN) is enabled, allows remote attackers to execute arbitrary code.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2004-0777
Probability of exploitation activity in the next 30 days: 8.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 93 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0777
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2004-0777
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2004-0777
-
http://security.gentoo.org/glsa/glsa-200408-19.xml
-
http://www.securityfocus.com/bid/10976
-
http://www.trustix.net/errata/2004/0043/
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17034
-
http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=131
Products affected by CVE-2004-0777
- cpe:2.3:a:inter7:courier-imap:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:1.7:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:inter7:courier-imap:2.2.0:*:*:*:*:*:*:*