Integer overflow in the indexurlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the startoctet variable. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
{
"binaries": [
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-admin"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-admin-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-clients"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-clients-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-common"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-common-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-dev"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-dev-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-doc-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-imapd"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-imapd-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-murder"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-murder-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-nntpd"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-nntpd-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-pop3d"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-pop3d-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-replication"
},
{
"binary_version": "2.4.18-3",
"binary_name": "cyrus-replication-2.4"
},
{
"binary_version": "2.4.18-3",
"binary_name": "libcyrus-imap-perl"
},
{
"binary_version": "2.4.18-3",
"binary_name": "libcyrus-imap-perl24"
}
]
}