IPSwitch IMail SMTP Multiple Vulnerabilities (OF, DoS)

High Nessus Plugin ID 10994


It may be possible to execute arbitrary commands on the remote system.


A vulnerability exists within IMail that allows remote attackers to gain SYSTEM level access to servers running IMail's SMTP daemon (versions 6.06 and below). The vulnerability stems from the IMail SMTP daemon not doing proper bounds checking on various input data that gets passed to the IMail Mailing List handler code. If an attacker crafts a special buffer and sends it to a remote IMail SMTP server, it is possible that an attacker can remotely execute code (commands) on the IMail system.


Apply vendor-supplied patches.

See Also


Plugin Details

Severity: High

ID: 10994

File Name: DDI_IPSwitch-IMail-SMTP-Buffer-Overflow.nasl

Version: $Revision: 1.22 $

Type: remote

Published: 2002/06/05

Modified: 2016/12/06

Dependencies: 17975

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2000/12/07

Reference Information

CVE: CVE-2001-0039, CVE-2001-0494

BID: 2083, 2651

OSVDB: 1686, 5610