Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gain a shell remotely --> Category: mixed

Ipswitch IMail IMAP EXAMINE Argument Buffer Overflow Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for IMAP EXAMINE argument buffer overflow vulnerability in Ipswitch IMail

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote IMAP server is vulnerable to a buffer overflow attack.

Description :

The remote host is running a version of the Ipswitch Collaboration
Suite / Ipswitch IMail IMAP server that is prone to a buffer overflow
when processing an EXAMINE command with a long argument.
Specifically, if an authenticated attacker sends an EXAMINE command
with a malformed mailbox name of 259 bytes or more, he will overwrite
the saved stack frame pointer and potentially gain control of process
execution.

See also :

http://www.idefense.com/application/poi/display?id=216&type=vulnerabilities

Solution :

Apply IMail Server 8.15 Hotfix 1 (February 3, 2005).

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:L/Au:R/C:C/A:C/I:C/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.