Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-3481
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-14 Sep, 2011 | 17:17
Updated At-11 Apr, 2025 | 00:51

The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
CPE Matches

cmu
cmu
>>cyrus_imap_server>>Versions up to 2.4.10(inclusive)
cpe:2.3:a:cmu:cyrus_imap_server:*:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.0.17
cpe:2.3:a:cmu:cyrus_imap_server:2.0.17:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.1.16
cpe:2.3:a:cmu:cyrus_imap_server:2.1.16:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.1.17
cpe:2.3:a:cmu:cyrus_imap_server:2.1.17:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.1.18
cpe:2.3:a:cmu:cyrus_imap_server:2.1.18:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.8
cpe:2.3:a:cmu:cyrus_imap_server:2.2.8:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.9
cpe:2.3:a:cmu:cyrus_imap_server:2.2.9:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.10
cpe:2.3:a:cmu:cyrus_imap_server:2.2.10:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.11
cpe:2.3:a:cmu:cyrus_imap_server:2.2.11:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.12
cpe:2.3:a:cmu:cyrus_imap_server:2.2.12:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.13
cpe:2.3:a:cmu:cyrus_imap_server:2.2.13:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.2.13p1
cpe:2.3:a:cmu:cyrus_imap_server:2.2.13p1:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.0
cpe:2.3:a:cmu:cyrus_imap_server:2.3.0:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.1
cpe:2.3:a:cmu:cyrus_imap_server:2.3.1:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.2
cpe:2.3:a:cmu:cyrus_imap_server:2.3.2:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.3
cpe:2.3:a:cmu:cyrus_imap_server:2.3.3:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.4
cpe:2.3:a:cmu:cyrus_imap_server:2.3.4:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.5
cpe:2.3:a:cmu:cyrus_imap_server:2.3.5:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.6
cpe:2.3:a:cmu:cyrus_imap_server:2.3.6:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.7
cpe:2.3:a:cmu:cyrus_imap_server:2.3.7:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.8
cpe:2.3:a:cmu:cyrus_imap_server:2.3.8:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.9
cpe:2.3:a:cmu:cyrus_imap_server:2.3.9:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.10
cpe:2.3:a:cmu:cyrus_imap_server:2.3.10:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.11
cpe:2.3:a:cmu:cyrus_imap_server:2.3.11:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.12
cpe:2.3:a:cmu:cyrus_imap_server:2.3.12:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.13
cpe:2.3:a:cmu:cyrus_imap_server:2.3.13:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.14
cpe:2.3:a:cmu:cyrus_imap_server:2.3.14:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.15
cpe:2.3:a:cmu:cyrus_imap_server:2.3.15:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.16
cpe:2.3:a:cmu:cyrus_imap_server:2.3.16:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.3.17
cpe:2.3:a:cmu:cyrus_imap_server:2.3.17:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.0
cpe:2.3:a:cmu:cyrus_imap_server:2.4.0:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.1
cpe:2.3:a:cmu:cyrus_imap_server:2.4.1:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.2
cpe:2.3:a:cmu:cyrus_imap_server:2.4.2:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.3
cpe:2.3:a:cmu:cyrus_imap_server:2.4.3:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.4
cpe:2.3:a:cmu:cyrus_imap_server:2.4.4:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.5
cpe:2.3:a:cmu:cyrus_imap_server:2.4.5:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.6
cpe:2.3:a:cmu:cyrus_imap_server:2.4.6:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.7
cpe:2.3:a:cmu:cyrus_imap_server:2.4.7:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.8
cpe:2.3:a:cmu:cyrus_imap_server:2.4.8:*:*:*:*:*:*:*
cmu
cmu
>>cyrus_imap_server>>2.4.9
cpe:2.3:a:cmu:cyrus_imap_server:2.4.9:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
Evaluator Description

Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugzilla.cyrusimap.org/show_bug.cgi?id=2772cve@mitre.org
N/A
http://bugzilla.cyrusimap.org/show_bug.cgi?id=3463cve@mitre.org
N/A
http://git.cyrusimap.org/cyrus-imapd/commit/?id=6e776956a1a9dfa58eacdd0ddd52644009eac9e5cve@mitre.org
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2012:037cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2011-1508.htmlcve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/69842cve@mitre.org
N/A
http://bugzilla.cyrusimap.org/show_bug.cgi?id=2772af854a3a-2127-422b-91ae-364da2661108
N/A
http://bugzilla.cyrusimap.org/show_bug.cgi?id=3463af854a3a-2127-422b-91ae-364da2661108
N/A
http://git.cyrusimap.org/cyrus-imapd/commit/?id=6e776956a1a9dfa58eacdd0ddd52644009eac9e5af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.mandriva.com/security/advisories?name=MDVSA-2012:037af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2011-1508.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/69842af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found