This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The remote IMAP server is vulnerable to a buffer overflow attack.
The remote host is running a version of the Ipswitch Collaboration
Suite / Ipswitch IMail IMAP server that is prone to a buffer overflow
when processing an EXAMINE command with a long argument.
Specifically, if an authenticated attacker sends an EXAMINE command
with a malformed mailbox name of 259 bytes or more, he will overwrite
the saved stack frame pointer and potentially gain control of process
See also :
Apply IMail Server 8.15 Hotfix 1 (February 3, 2005).
Risk factor :
High / CVSS Base Score : 9.0
CVSS Temporal Score : 6.7
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 17311 (imail_imapd_examine_overflow.nasl)
Bugtraq ID: 12780
CVE ID: CVE-2005-0707
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.