Ipswitch IMail Server < 2006.2 Multiple Remote Overflows

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote mail server is affected by multiple buffer overflow
vulnerabilities.

Description :

The remote host is running Ipswitch Collaboration Suite / IMail,
commercial messaging and collaboration suites for Windows.

According to its banner, the version of Ipswitch Collaboration Suite /
IMail installed on the remote host has several unspecified buffer
overflows in various service components and ActiveX controls. An
attacker may be able to leverage these issues to crash the affected
service or even to execute arbitrary code remotely, by default with
LOCAL SYSTEM privileges.

See also :

http://www.nessus.org/u?b18ff8e8
http://seclists.org/bugtraq/2007/Mar/81
http://www.ipswitch.com/support/ics/updates/ics20062.asp
http://support.ipswitch.com/kb/IM-20070305-JH01.htm

Solution :

Upgrade to version 2006.2 of the appropriate application.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 24782 (ipswitch_imail_2006_2.nasl)

Bugtraq ID: 22852

CVE ID: CVE-2007-1637

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now