This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote mail server is affected by multiple vulnerabilities.
The remote host is running Ipswitch IMail, a commercial messaging and
collaboration suite for Windows.
According to its banner, the version of Ipswitch IMail installed on
the remote host has several buffer overflows in its IMAP service
component, one of which can be exploited prior to authentication to
execute arbitrary code with SYSTEM privileges.
In addition, there is also an denial of service issue that can cause
the IM Server to crash without authentication.
See also :
Upgrade to Ipswitch IMail version 2006.21 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true