How to Buy
This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The remote IMAP server is prone to a buffer overflow.
The remote host appears to be running a version of FTGate, a
commercial groupware mail server for Windows from FTGate Technology
The version of FTGate installed on the remote host includes an IMAP
server that is prone to a buffer overflow attack due to boundary
errors in its handling of various IMAP commands. An authenticated
attacker can exploit this issue to crash the application itself and
possibly to execute arbitrary code subject to the privileges of the
See also :
Upgrade to FTGate 4.4.002 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.5
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 20221 (ftgate_overflow.nasl)
Bugtraq ID: 15449
CVE ID: CVE-2005-3640
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.