[VIM] possibly false: CVE-2009-0671 (IMAP c-client format string)

str0ke str0ke at milw0rm.com
Tue Feb 24 16:08:33 UTC 2009


Yep anything to do with Faryad Rahmany / c1pher is fake, mostly copy and
pasted information from multiple exploits.

/str0ke

Steven M. Christey wrote:
> Researcher: Faryad rahmany
>
> It's been pointed out to me that CVE-2009-0671 is likely fake.  At the
> very least, the exploit has serious problems:
>
> 1) It uses Unix-specific include files but calls the Windows-specific
>    WSAStartup()
>
> 2) It contains clear syntax errors like he-h_addr
>
> This was also reported in BID:33795 and
> XF:imap-toolkit-cclient-format-string(48798).  No idea if they've done
> additional research.
>
> Currently I'm writing it up as questionable, but a more direct vendor
> dispute might follow soon.
>
> - Steve
>
> ======================================================
> Name: CVE-2009-0671
> Status: Candidate
> URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0671
> Reference: MISC:http://packetstormsecurity.org/0902-exploits/uwimap-format.txt
> Reference: BID:33795
> Reference: URL:http://www.securityfocus.com/bid/33795
> Reference: XF:imap-toolkit-cclient-format-string(48798)
> Reference: URL:http://xforce.iss.net/xforce/xfdb/48798
>
> Format string vulnerability in the University of Washington (UW)
> c-client library, as used by the UW IMAP toolkit imap-2007d and other
> applications, allows remote attackers to execute arbitrary code via
> format string specifiers in the initial request to the IMAP port
> (143/tcp).  NOTE: it is highly likely that this report is inaccurate,
> since the associated exploit contains syntax errors and uses Unix-only
> include files while invoking Windows functions.
>
>
>
>   


More information about the VIM mailing list