{"api_version":"1","generated_at":"2026-05-11T18:49:25+00:00","cve":"CVE-2006-5973","urls":{"html":"https://cve.report/CVE-2006-5973","api":"https://cve.report/api/cve/CVE-2006-5973.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-5973","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-5973"},"summary":{"title":"CVE-2006-5973","description":"Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to \"yes,\" allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.","state":"PUBLISHED","assigner":"mitre","published_at":"2006-11-20 19:07:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html","name":"http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"[Dovecot-news] 1.0.rc15 released","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://dovecot.org/list/dovecot-news/2006-November/000023.html","name":"http://dovecot.org/list/dovecot-news/2006-November/000023.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[Dovecot-news] Security hole #2: Off-by-one buffer overflow with\tmmap_disable=yes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1017288","name":"http://securitytracker.com/id?1017288","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Dovecot POP3/IMAP Cache File Buffer Overflow May Let Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23172","name":"http://secunia.com/advisories/23172","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rPath update for dovecot - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-802","name":"https://issues.rpath.com/browse/RPL-802","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://www.novell.com/linux/security/advisories/2006_73_mono.html","name":"http://www.novell.com/linux/security/advisories/2006_73_mono.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Security Announcement","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/4614","name":"http://www.vupen.com/english/advisories/2006/4614","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/21183/info","name":"http://www.securityfocus.com/bid/21183/info","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.ubuntu.com/usn/usn-387-1","name":"http://www.ubuntu.com/usn/usn-387-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-387-1: Dovecot vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30433","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30433","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23150","name":"http://secunia.com/advisories/23150","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for dovecot - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23213","name":"http://secunia.com/advisories/23213","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE update for mono - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/23007","name":"http://secunia.com/advisories/23007","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Dovecot Cache File Off-By-One Vulnerability - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/452081/100/0/threaded","name":"http://www.securityfocus.com/archive/1/452081/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/21183","name":"BID:21183","refsource":"MITRE","tags":[],"title":"Dovecot IMAP Server Mapped Pages Off-By-One Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-5973","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-5973","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.alpha1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.alpha2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.alpha3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.alpha4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.alpha5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.beta9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.rc9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test53","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test54","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test55","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test56","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test57","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test58","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test59","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test60","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test61","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test62","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test63","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test64","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test65","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test66","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test67","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test68","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test69","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test70","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test71","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test72","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test73","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test74","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test75","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test76","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test77","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test78","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test79","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"5973","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"timo_sirainen","cpe5":"dovecot","cpe6":"1.0.test80","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T20:12:31.341Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"[Dovecot-news] 20091119 1.0.rc15 released","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html"},{"name":"USN-387-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-387-1"},{"name":"23150","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23150"},{"name":"SUSE-SA:2006:073","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2006_73_mono.html"},{"name":"23007","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23007"},{"name":"23172","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23172"},{"name":"dovecot-indexcache-bo(30433)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30433"},{"name":"20061119 Dovecot IMAP/POP3 server: Off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/452081/100/0/threaded"},{"name":"[Dovecot-news] 20061119 Security hole #2: Off-by-one buffer overflow with mmap_disable=yes","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://dovecot.org/list/dovecot-news/2006-November/000023.html"},{"name":"23213","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23213"},{"name":"1017288","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1017288"},{"name":"ADV-2006-4614","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/4614"},{"name":"21183","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/21183/info"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-802"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-11-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to \"yes,\" allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-17T20:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"[Dovecot-news] 20091119 1.0.rc15 released","tags":["mailing-list","x_refsource_MLIST"],"url":"http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html"},{"name":"USN-387-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-387-1"},{"name":"23150","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23150"},{"name":"SUSE-SA:2006:073","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2006_73_mono.html"},{"name":"23007","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23007"},{"name":"23172","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23172"},{"name":"dovecot-indexcache-bo(30433)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30433"},{"name":"20061119 Dovecot IMAP/POP3 server: Off-by-one buffer overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/452081/100/0/threaded"},{"name":"[Dovecot-news] 20061119 Security hole #2: Off-by-one buffer overflow with mmap_disable=yes","tags":["mailing-list","x_refsource_MLIST"],"url":"http://dovecot.org/list/dovecot-news/2006-November/000023.html"},{"name":"23213","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23213"},{"name":"1017288","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1017288"},{"name":"ADV-2006-4614","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/4614"},{"name":"21183","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/21183/info"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-802"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2006-5973","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to \"yes,\" allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"[Dovecot-news] 20091119 1.0.rc15 released","refsource":"MLIST","url":"http://dovecot.org/pipermail/dovecot-news/2006-November/000024.html"},{"name":"USN-387-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-387-1"},{"name":"23150","refsource":"SECUNIA","url":"http://secunia.com/advisories/23150"},{"name":"SUSE-SA:2006:073","refsource":"SUSE","url":"http://www.novell.com/linux/security/advisories/2006_73_mono.html"},{"name":"23007","refsource":"SECUNIA","url":"http://secunia.com/advisories/23007"},{"name":"23172","refsource":"SECUNIA","url":"http://secunia.com/advisories/23172"},{"name":"dovecot-indexcache-bo(30433)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30433"},{"name":"20061119 Dovecot IMAP/POP3 server: Off-by-one buffer overflow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/452081/100/0/threaded"},{"name":"[Dovecot-news] 20061119 Security hole #2: Off-by-one buffer overflow with mmap_disable=yes","refsource":"MLIST","url":"http://dovecot.org/list/dovecot-news/2006-November/000023.html"},{"name":"23213","refsource":"SECUNIA","url":"http://secunia.com/advisories/23213"},{"name":"1017288","refsource":"SECTRACK","url":"http://securitytracker.com/id?1017288"},{"name":"ADV-2006-4614","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/4614"},{"name":"21183","refsource":"BID","url":"http://www.securityfocus.com/bid/21183/info"},{"name":"https://issues.rpath.com/browse/RPL-802","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-802"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2006-5973","datePublished":"2006-11-20T19:00:00.000Z","dateReserved":"2006-11-20T00:00:00.000Z","dateUpdated":"2024-08-07T20:12:31.341Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-11-20 19:07:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0:*:*:*:*:*:*:*","matchCriteriaId":"FE001666-8419-4F23-A9C4-CC2E929C7447"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.alpha1:*:*:*:*:*:*:*","matchCriteriaId":"86F564E2-721D-4F4F-8B45-FC90F2D62DE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.alpha2:*:*:*:*:*:*:*","matchCriteriaId":"3A8EE39E-DF06-4A1B-90F4-A7E21D330BD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.alpha3:*:*:*:*:*:*:*","matchCriteriaId":"C69B06A3-A25D-40B1-B9CB-E68ADB9E5D07"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.alpha4:*:*:*:*:*:*:*","matchCriteriaId":"0F747D8B-F93C-4E3C-BBF1-0550B20619F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.alpha5:*:*:*:*:*:*:*","matchCriteriaId":"6C4E1572-1B6B-419E-93DA-6402A1D58BD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta1:*:*:*:*:*:*:*","matchCriteriaId":"DD171A21-01BA-4CCB-8356-1EC55E539AE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta2:*:*:*:*:*:*:*","matchCriteriaId":"0283E4D9-CA0F-476A-9A60-F3907161E77C"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta3:*:*:*:*:*:*:*","matchCriteriaId":"09E2770B-890A-445B-A2DC-4F9C51907D6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta4:*:*:*:*:*:*:*","matchCriteriaId":"7D8F5B7D-C37F-4F68-8C1A-8007B4DAAF8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta5:*:*:*:*:*:*:*","matchCriteriaId":"34F3EC01-44EE-412F-91DC-7D3DDF7391BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta6:*:*:*:*:*:*:*","matchCriteriaId":"05F7212B-6EBA-4D7C-B109-51E8C6AAB091"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta7:*:*:*:*:*:*:*","matchCriteriaId":"CA82FA94-2DDF-4348-A7CE-26F2569EAC07"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta8:*:*:*:*:*:*:*","matchCriteriaId":"A6B819BA-4A6D-47ED-AFBC-88FDA2C6E80F"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.beta9:*:*:*:*:*:*:*","matchCriteriaId":"BF2C16A6-F6C5-40E5-B047-49BD1587B7A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc1:*:*:*:*:*:*:*","matchCriteriaId":"D48448F5-A26B-4C4D-87A3-9736AD885CE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc2:*:*:*:*:*:*:*","matchCriteriaId":"50C114BF-DE41-4E48-B09D-6721591EC30A"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc3:*:*:*:*:*:*:*","matchCriteriaId":"A9D62301-F829-4834-AEEE-9A1C16B4C97E"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc4:*:*:*:*:*:*:*","matchCriteriaId":"8F25E954-274D-4264-9824-51A741620FE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc5:*:*:*:*:*:*:*","matchCriteriaId":"DC6C599C-446A-4B2E-96F8-BB110A1C504E"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc6:*:*:*:*:*:*:*","matchCriteriaId":"81AC8ED0-0A6D-4FC6-BC4B-77F13D8304BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc7:*:*:*:*:*:*:*","matchCriteriaId":"3E0A7237-E966-4FB7-A8BA-1BBDDB255E07"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc8:*:*:*:*:*:*:*","matchCriteriaId":"9CB80AEB-0EED-4489-9EA6-D0A161CA3358"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc9:*:*:*:*:*:*:*","matchCriteriaId":"F2377CA2-F186-4656-9539-9C119F15AB24"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc10:*:*:*:*:*:*:*","matchCriteriaId":"162BCB07-AC35-4920-92DD-F30F76F50661"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc11:*:*:*:*:*:*:*","matchCriteriaId":"1D7A1992-2D8E-404E-A465-04AA102D177F"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc12:*:*:*:*:*:*:*","matchCriteriaId":"15AAC5DE-3EBD-410C-AF52-34206798F5A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc13:*:*:*:*:*:*:*","matchCriteriaId":"70F4B6B6-EC9F-477D-B2C4-AA866171AF7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.rc14:*:*:*:*:*:*:*","matchCriteriaId":"7C2BA3FB-7839-4C30-8FCD-1A2B6EC1366C"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test53:*:*:*:*:*:*:*","matchCriteriaId":"7F9FB465-9B28-4E51-9C1B-3B3E95C770AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test54:*:*:*:*:*:*:*","matchCriteriaId":"2E15588C-E706-442C-8F95-D08D7B227A19"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test55:*:*:*:*:*:*:*","matchCriteriaId":"3015515E-7ED7-4308-8DD5-F9D59FCBE23D"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test56:*:*:*:*:*:*:*","matchCriteriaId":"F1BF76DF-2559-4B50-9931-95CE5B6D3B32"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test57:*:*:*:*:*:*:*","matchCriteriaId":"480F1CDD-8B6D-4EB9-9FE7-89124E555F38"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test58:*:*:*:*:*:*:*","matchCriteriaId":"1B9DD306-09D5-4975-AC5C-BDC6D352A4F8"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test59:*:*:*:*:*:*:*","matchCriteriaId":"FA7048E7-BCCF-4EC5-9275-616A65FB93AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test60:*:*:*:*:*:*:*","matchCriteriaId":"A29452A0-4437-4E87-A58D-A590233BCCA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test61:*:*:*:*:*:*:*","matchCriteriaId":"E2953A3F-5B7E-4589-A798-04ED8FA6D846"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test62:*:*:*:*:*:*:*","matchCriteriaId":"04EEFEF2-6931-4C8A-83DC-B6EBFA0C82EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test63:*:*:*:*:*:*:*","matchCriteriaId":"01C2647D-712E-4C02-BFBA-9CAB0CB79874"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test64:*:*:*:*:*:*:*","matchCriteriaId":"E5213FB0-0267-49FC-85B1-013B37C4CB02"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test65:*:*:*:*:*:*:*","matchCriteriaId":"B0671DA4-140C-45B3-8AC1-DD3CD9AD860D"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test66:*:*:*:*:*:*:*","matchCriteriaId":"5C41A65F-F001-495A-B37F-6A2BFC428306"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test67:*:*:*:*:*:*:*","matchCriteriaId":"A8EFC54A-B5EE-4C1F-896D-EAEAAAF4C8B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test68:*:*:*:*:*:*:*","matchCriteriaId":"8E274331-9872-428C-B82D-0E6E73D2C1AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test69:*:*:*:*:*:*:*","matchCriteriaId":"FFF7A820-9B52-4FAB-B614-2DD790276697"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test70:*:*:*:*:*:*:*","matchCriteriaId":"DFD8BA09-E10A-410F-AB50-B85D3EDC14AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test71:*:*:*:*:*:*:*","matchCriteriaId":"31468EE5-EDDE-478E-BE08-076BE53AE9BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test72:*:*:*:*:*:*:*","matchCriteriaId":"2E5FBEBE-AF1F-469C-B28E-9A9CD067945F"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test73:*:*:*:*:*:*:*","matchCriteriaId":"0074CD5D-3B37-42E3-A89E-DCF568806DAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test74:*:*:*:*:*:*:*","matchCriteriaId":"6C89A772-ED4A-40FB-8918-B1533054F205"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test75:*:*:*:*:*:*:*","matchCriteriaId":"4B0D065C-E2EF-41F8-A641-10B93F600379"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test76:*:*:*:*:*:*:*","matchCriteriaId":"75154FA2-E5D1-4846-B574-19944D85276F"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test77:*:*:*:*:*:*:*","matchCriteriaId":"F0EEF31C-CFC7-46B8-B7D9-7D0541F4181D"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test78:*:*:*:*:*:*:*","matchCriteriaId":"6697F625-06B6-4713-BB58-8B6CA6257976"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test79:*:*:*:*:*:*:*","matchCriteriaId":"D42FE491-70B5-4827-A3CF-0DF4B4751B67"},{"vulnerable":true,"criteria":"cpe:2.3:a:timo_sirainen:dovecot:1.0.test80:*:*:*:*:*:*:*","matchCriteriaId":"69CAA28D-DDBF-4026-86D6-E4307E24E223"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"5973","Ordinal":"1","Title":"CVE-2006-5973","CVE":"CVE-2006-5973","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"5973","Ordinal":"1","NoteData":"Off-by-one buffer overflow in Dovecot 1.0test53 through 1.0.rc14, and possibly other versions, when index files are used and mmap_disable is set to \"yes,\" allows remote authenticated IMAP or POP3 users to cause a denial of service (crash) via unspecified vectors involving the cache file.","Type":"Description","Title":"CVE-2006-5973"},{"CveYear":"2006","CveId":"5973","Ordinal":"2","NoteData":"2006-11-20","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"5973","Ordinal":"3","NoteData":"2018-10-17","Type":"Other","Title":"Modified"}]}}}