IA eMailServer IMAP SEARCH Command Remote Overflow

This script is Copyright (C) 2006-2011 Tenable Network Security, Inc.


Synopsis :

The remote IMAP server is susceptible to buffer overflow attacks.

Description :

The remote host is running IA eMailServer, a commercial messaging
system for Windows.

The IMAP server bundled with the version of IA eMailServer installed
on the remote host crashes when it receives a SEARCH command argument
of 560 or more characters. An authenticated attacker could exploit
this issue to crash the service and possibly to execute arbitrary code
remotely.

Note that IA eMailServer can be configured to run as a service with
LOCAL SYSTEM privileges, although this is not the default.

See also :

http://www.securityfocus.com/archive/1/425586/30/0/threaded

Solution :

Unknown at this time.

Risk factor :

Medium / CVSS Base Score : 6.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P)
CVSS Temporal Score : 5.5
(CVSS2#E:U/RL:U/RC:ND)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 20960 (ia_emailserver_search_overflow.nasl)

Bugtraq ID: 16744

CVE ID: CVE-2006-0853

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now