|
Family: Denial of Service --> Category: infos
Ipswitch IMAPD LIST Command Denial of Service Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for LIST command denial of service vulnerability in Ipswitch IMAPD
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote IMAP server is affected by a denial of service
vulnerability.
Description :
The remote host is running Ipswitch Collaboration Suite or IMail
Server, commercial messaging and collaboration suites for Windows.
The version of Ipswitch Collaboration Suite / IMail server installed
on the remote host contains an IMAP server that suffers from a denial
of service flaw. Using a specially crafted LIST command of around
8000 bytes, an authenticated attacker can crash the IMAP server on the
affected host, thereby denying service to legitimate users.
See also :
http://www.idefense.com/application/poi/display?id=347&type=vulnerabilities
http://www.ipswitch.com/support/ics/updates/ics202.asp
http://www.ipswitch.com/support/imail/releases/imail_professional/im822.asp
Solution :
Upgrade to Ipswitch Collaboration Suite 2.02 / IMail 8.22 or later.
Threat Level:
Medium / CVSS Base Score : 5.0
(AV:R/AC:L/Au:NR/C:N/I:N/A:C/B:A)
Click HERE for more information and discussions on this network vulnerability scan.
|