Description
The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2002-1761 | The default configuration of University of Washington IMAP daemon (wu-imapd), when running on a system that does not allow shell access, allows a local user with a valid IMAP account to read arbitrary files as that user. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T03:34:56.156Z
Reserved: 2005-06-21T00:00:00.000Z
Link: CVE-2002-1782
No data.
Status : Modified
Published: 2002-12-31T05:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2002-1782
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD