up-imapproxy is reported prone to multiple remote vulnerabilities. The following specific issues are reported: It is reported that multiple denial of service conditions exist in the way up-imapproxy handles literal values. Literal data processed by affected functions will result in a denial of service. Additionally, a literal value passed as a command to the affected service will result in a denial of service if the command does not exist. A remote attacker may exploit these vulnerabilities to crash the affected service effectively denying service to legitimate users. Finally, it is reported that literal value sizes are stored in signed integer format. The discoverer of these vulnerabilities reports that this may result in a boundary condition on 64-bit platforms. A remote attacker may potentially exploit this condition to reveal potentially sensitive data. It should be noted that reports indicate that up-imapproxy may not actually execute on 64-bit platforms.
up-imapproxy is reported prone to multiple remote vulnerabilities. The following specific issues are reported: It is reported that multiple denial of service conditions exist in the way up-imapproxy handles literal values. Literal data processed by affected functions will result in a denial of service. Additionally, a literal value passed as a command to the affected service will result in a denial of service if the command does not exist. A remote attacker may exploit these vulnerabilities to crash the affected service effectively denying service to legitimate users. Finally, it is reported that literal value sizes are stored in signed integer format. The discoverer of these vulnerabilities reports that this may result in a boundary condition on 64-bit platforms. A remote attacker may potentially exploit this condition to reveal potentially sensitive data. It should be noted that reports indicate that up-imapproxy may not actually execute on 64-bit platforms.