Description
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1608-1 | php5 security update |
Debian DLA |
DLA-1700-1 | uw-imap security update |
Debian DLA |
DLA-2866-1 | uw-imap security update |
Debian DSA |
DSA-4353-1 | php7.0 security update |
Ubuntu USN |
USN-4160-1 | UW IMAP vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:37:11.529Z
Reserved: 2018-11-25T00:00:00.000Z
Link: CVE-2018-19518
No data.
Status : Modified
Published: 2018-11-25T10:29:00.250
Modified: 2024-11-21T03:58:04.993
Link: CVE-2018-19518
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN