Some vulnerabilities have been reported in Eudora WorldMail IMAP Server, which can be exploited by malicious users to bypass certain security restrictions and to gain access to potentially sensitive information, or by malicious people to compromise a vulnerable system.
1) A directory traversal error exists in various IMAP folder manipulation commands. This can be exploited to read arbitrary user's emails and to move arbitrary folders on the system by supplying folder names containing directory traversal sequences to the affected IMAP commands (e.g. select).
Successful exploitation requires logon to the IMAP server.
2) A boundary error exists in the IMAP server when parsing user-supplied IMAP commands. This can be exploited to cause a stack-based overflow via a long string containing a "}" character.
Successful exploitation allows arbitrary code execution without requiring prior authentication.
The vulnerabilities have been reported in version 3.0. Prior versions may also be affected.
Solution: Disable the IMAP server, or use it only when connected to trusted networks.
Provided and/or discovered by: 1) FistFuXXer
2) Independently discovered by Tim Shelton, posidron, anonymous, and Nico.
Original Advisory: iDEFENSE:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Eudora WorldMail IMAP Server Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.