search menu icon-carat-right cmu-wordmark

CERT Coordination Center

UW-imapd fails to properly authenticate users when using CRAM-MD5

Vulnerability Note VU#702777

Original Release Date: 2005-01-27 | Last Revised: 2005-04-28

Overview

A vulnerablility in an authentication method for the University of Washington IMAP server could allow a remote attacker to access any user's mailbox.

Description

The Internet Message Access Protocol (IMAP) is a method of accessing electronic messages kept on a remote mail server and is specified in RFC3501. The University of Washington IMAP server features multiple user authentication methods, including the Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5) as defined by RFC2195. A logic error in the code that handles CRAM-MD5 incorrectly specifies the conditions of successful authentication. This error results in a vulnerability that could allow a remote attacker to successfully authenticate as any user on the target system. This vulnerability only affects sites that have explicitly enabled CRAM-MD5 style authentication; it is not enabled in the default configuration of the UW-IMAP server.

Impact

A remote attacker could authenticate as any user on the target system and thereby read and delete email in the authorized user's account.

Solution

Upgrade or apply a patch

Fixed versions of the software have been released to address this issue. Please see the Systems Affected section of this document for more details.

Vendor Information

702777
 

View all 39 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Mark Crispin and Hugh Sheets of the University of Washington for reporting this vulnerability.

This document was written by Chad R Dougherty.

Other Information

CVE IDs: CVE-2005-0198
Severity Metric: 6.08
Date Public: 2005-01-04
Date First Published: 2005-01-27
Date Last Updated: 2005-04-28 14:09 UTC
Document Revision: 21

Sponsored by CISA.