Old IMAP/POP Server Vulnerability

HIGH (10.0) No Patch (10478 days)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 5.49% chance of exploitation (percentile: 90%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: Exploit-DB

How we test →

What is it?

The University of Washington's implementation of IMAP and POP servers contained a buffer overflow vulnerability. This allowed attackers to execute arbitrary code on the server by sending malicious input through email or other protocols.

Am I affected?

You're affected if you use Buffer overflow. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

IBM / Exchange

How to fix

Upgrade to IBM Exchange version 4.3.5 or later.
Maven: Update your dependency in the pom.xml file
If you can't upgrade immediately:
- Disable IMAP/POP services on the server
- Remove any unnecessary configuration files