cpe:/a:university_of_washington:imap:2000 cpe:/a:university_of_washington:imap:2000a cpe:/a:university_of_washington:imap:2000b cpe:/a:university_of_washington:imap:2000c cpe:/a:university_of_washington:imap:2001 cpe:/a:university_of_washington:imap:2001a cpe:/a:university_of_washington:imap:2002 cpe:/a:university_of_washington:imap:2002a cpe:/a:university_of_washington:imap:2002b cpe:/a:university_of_washington:imap:2002c cpe:/a:university_of_washington:imap:2002d cpe:/a:university_of_washington:imap:2002e cpe:/a:university_of_washington:imap:2002f cpe:/a:university_of_washington:imap:2004 cpe:/a:university_of_washington:imap:2004a cpe:/a:university_of_washington:imap:2004b cpe:/a:university_of_washington:imap:2004c cpe:/a:university_of_washington:imap:2004d cpe:/a:university_of_washington:imap:2004e cpe:/a:university_of_washington:imap:2004f cpe:/a:university_of_washington:imap:2004g cpe:/a:university_of_washington:imap:2006 cpe:/a:university_of_washington:imap:2006a cpe:/a:university_of_washington:imap:2006b cpe:/a:university_of_washington:imap:2006c cpe:/a:university_of_washington:imap:2006d cpe:/a:university_of_washington:imap:2006e cpe:/a:university_of_washington:imap:2006f cpe:/a:university_of_washington:imap:2006g cpe:/a:university_of_washington:imap:2006h cpe:/a:university_of_washington:imap:2006i cpe:/a:university_of_washington:imap:2006j cpe:/a:university_of_washington:imap:2006k cpe:/a:university_of_washington:imap:2007 cpe:/a:university_of_washington:imap:2007a cpe:/a:university_of_washington:imap:2007b cpe:/a:university_of_washington:imap:2007d CVE-2008-5514 2008-12-23T13:30:03.280-05:00 2017-08-07T21:33:21.280-04:00 4.3 NETWORK MEDIUM NONE NONE NONE PARTIAL http://nvd.nist.gov 2008-12-23T13:56:00.000-05:00 SECTRACK 1021485 BID 32958 SECUNIA 33275 SECUNIA 33638 VUPEN ADV-2008-3490 FEDORA FEDORA-2009-0371 MANDRIVA MDVSA-2009:146 CONFIRM http://www.washington.edu/imap/documentation/RELNOTES.html CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=477227 XF uwimapd-rfc822outputchar-dos(47526) Off-by-one error in the rfc822_output_char function in the RFC822BUFFER routines in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit before imap-2007e and other applications, allows context-dependent attackers to cause a denial of service (crash) via an e-mail message that triggers a buffer overflow.