A logic error in the CRAM-MD5 code for the University of Washington IMAP (UW-IMAP) server, when Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) is enabled, does not properly enforce all the required conditions for successful authentication, which allows remote attackers to authenticate as arbitrary users.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/702777 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/CRDY-68QSL5 | Patch US Government Resource |
http://www.gentoo.org/security/en/glsa/glsa-200502-02.xml | Patch |
http://www.redhat.com/support/errata/RHSA-2005-128.html | Patch Vendor Advisory |
http://www.securityfocus.com/bid/12391 | |
http://securitytracker.com/id?1013037 | |
http://secunia.com/advisories/14057 | |
http://secunia.com/advisories/14097 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2005:026 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11306 |
Configurations
Information
Published : 2005-05-01 21:00
Updated : 2017-10-10 18:29
NVD link : CVE-2005-0198
Mitre link : CVE-2005-0198
JSON object : View
CWE
Products Affected
university_of_washington
- uw-imap