CVE-2019-11356

The CalDAV feature in httpd in Cyrus IMAP 2.5.x through 2.5.12 and 3.0.x through 3.0.9 allows remote attackers to execute arbitrary code via a crafted HTTP PUT operation for an event with a long iCalendar property name.
References
Link Resource
https://access.redhat.com/errata/RHSA-2019:1771 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGO43JS7IFDNITHXOOHOP6JHRKRDIYY6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PICSZDC3UGEUZ27VXGGM6OFI67D3KKLZ/
https://seclists.org/bugtraq/2019/Jun/9 Mailing List Third Party Advisory
https://usn.ubuntu.com/4566-1/ Third Party Advisory
https://www.cyrusimap.org/imap/download/release-notes/2.5/index.html Release Notes Vendor Advisory
https://www.cyrusimap.org/imap/download/release-notes/2.5/x/2.5.13.html Release Notes Vendor Advisory
https://www.cyrusimap.org/imap/download/release-notes/3.0/index.html Release Notes Vendor Advisory
https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.10.html Release Notes Vendor Advisory
https://www.debian.org/security/2019/dsa-4458 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1771 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGO43JS7IFDNITHXOOHOP6JHRKRDIYY6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PICSZDC3UGEUZ27VXGGM6OFI67D3KKLZ/
https://seclists.org/bugtraq/2019/Jun/9 Mailing List Third Party Advisory
https://usn.ubuntu.com/4566-1/ Third Party Advisory
https://www.cyrusimap.org/imap/download/release-notes/2.5/index.html Release Notes Vendor Advisory
https://www.cyrusimap.org/imap/download/release-notes/2.5/x/2.5.13.html Release Notes Vendor Advisory
https://www.cyrusimap.org/imap/download/release-notes/3.0/index.html Release Notes Vendor Advisory
https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.10.html Release Notes Vendor Advisory
https://www.debian.org/security/2019/dsa-4458 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cyrus:imap:*:*:*:*:*:*:*:*
cpe:2.3:a:cyrus:imap:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-06-03 20:29

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11356

Mitre link : CVE-2019-11356

CVE.ORG link : CVE-2019-11356


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

redhat

  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux
  • enterprise_linux_server_tus

cyrus

  • imap

canonical

  • ubuntu_linux
CWE
CWE-787

Out-of-bounds Write