Ipswitch IMail Server < 2006.21 Multiple Vulnerabilities

critical Nessus Plugin ID 25737

Synopsis

The remote mail server is affected by multiple vulnerabilities.

Description

The remote host is running Ipswitch IMail, a commercial messaging and collaboration suite for Windows.

According to its banner, the version of Ipswitch IMail installed on the remote host has several buffer overflows in its IMAP service component, one of which can be exploited prior to authentication to execute arbitrary code with SYSTEM privileges.

In addition, there is also a denial of service issue that can cause the IM Server to crash without authentication.

Solution

Upgrade to Ipswitch IMail version 2006.21 or later.

See Also

http://www.nessus.org/u?194eb0fd

https://www.securityfocus.com/archive/1/474040/30/0/threaded

https://www.zerodayinitiative.com/advisories/ZDI-07-042/

https://www.zerodayinitiative.com/advisories/ZDI-07-043/

https://seclists.org/bugtraq/2007/Jul/275

https://seclists.org/bugtraq/2007/Jul/277

http://www.ipswitch.com/support/imail/releases/im200621.asp

Plugin Details

Severity: Critical

ID: 25737

File Name: ipswitch_imail_2006_21.nasl

Version: 1.27

Type: remote

Agent: windows

Family: Windows

Published: 7/19/2007

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ipswitch:imail

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/19/2007

Vulnerability Publication Date: 3/9/2007

Exploitable With

Core Impact

Metasploit (Ipswitch IMail IMAP SEARCH Buffer Overflow)

Reference Information

CVE: CVE-2007-2795, CVE-2007-3925, CVE-2007-3926, CVE-2007-3927

BID: 24962

CWE: 119