CVE-2019-18928
Summary
| CVE | CVE-2019-18928 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-11-15 04:15:00 UTC |
| Updated | 2023-11-07 03:07:00 UTC |
| Description | Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Cyrus | Imap | All | All | All | All |
| Application | Cyrus | Imap | All | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 30 | All | All | All |
| Operating System | Fedoraproject | Fedora | 31 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [SECURITY] Fedora 31 Update: cyrus-imapd-3.0.12-1.fc31 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] Fedora 30 Update: cyrus-imapd-3.0.12-1.fc30 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| [SECURITY] [DLA 3052-1] cyrus-imapd security update | MLIST | lists.debian.org | |
| [SECURITY] Fedora 30 Update: cyrus-imapd-3.0.12-1.fc30 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | |
| Cyrus IMAP 3.0.12 Release Notes — Cyrus IMAP 3.0.13 (stable) documentation | MISC | www.cyrusimap.org | Patch, Release Notes, Third Party Advisory |
| [SECURITY] Fedora 31 Update: cyrus-imapd-3.0.12-1.fc31 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | |
| Cyrus IMAP 2.5.14 Release Notes — Cyrus IMAP 3.0.13 (stable) documentation | MISC | www.cyrusimap.org | Patch, Release Notes, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.