{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2015-10-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-13T09:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html"},{"name":"[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2015/11/04/3"},{"name":"openSUSE-SU-2015:2130","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html"},{"name":"SUSE-SU-2016:1459","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html"},{"name":"1034282","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1034282"},{"name":"SUSE-SU-2016:1457","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T08:06:31.833Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://docs.cyrus.foundation/imap/release-notes/2.5/x/2.5.7.html"},{"name":"[oss-security] 20151104 Re: CVE request: urlfetch range handling flaw in Cyrus IMAP","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2015/11/04/3"},{"name":"openSUSE-SU-2015:2130","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00156.html"},{"name":"SUSE-SU-2016:1459","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html"},{"name":"1034282","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1034282"},{"name":"SUSE-SU-2016:1457","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cyrus.foundation/cyrus-imapd/commit/?id=6fb6a272171f49c79ba6ab7c6403eb25b39ec1b2"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2015-8078","datePublished":"2015-12-03T20:00:00.000Z","dateReserved":"2015-11-04T00:00:00.000Z","dateUpdated":"2024-08-06T08:06:31.833Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}